Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2023-21400
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T09:36:34.437Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://source.android.com/security/bulletin/pixel/2023-07-01", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/07/14/2", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/07/19/2", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/07/19/7", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/7", }, { tags: [ "x_transferred", ], url: "https://www.debian.org/security/2023/dsa-5480", }, { tags: [ "x_transferred", ], url: "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html", }, { tags: [ "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20240119-0012/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Android", vendor: "Google", versions: [ { status: "affected", version: "Android kernel", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.</p>", }, ], value: "In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.", }, ], problemTypes: [ { descriptions: [ { description: "Elevation of privilege", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-19T16:06:38.820Z", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { url: "https://source.android.com/security/bulletin/pixel/2023-07-01", }, { url: "http://www.openwall.com/lists/oss-security/2023/07/14/2", }, { url: "http://www.openwall.com/lists/oss-security/2023/07/19/2", }, { url: "http://www.openwall.com/lists/oss-security/2023/07/19/7", }, { url: "http://www.openwall.com/lists/oss-security/2023/07/25/7", }, { url: "https://www.debian.org/security/2023/dsa-5480", }, { url: "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html", }, { url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", }, { url: "https://security.netapp.com/advisory/ntap-20240119-0012/", }, ], }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2023-21400", datePublished: "2023-07-12T23:53:37.414Z", dateReserved: "2022-11-03T22:37:50.667Z", dateUpdated: "2025-02-13T16:40:14.210Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2023-21400\",\"sourceIdentifier\":\"security@android.com\",\"published\":\"2023-07-13T00:15:24.340\",\"lastModified\":\"2025-02-13T17:16:02.800\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-667\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html\",\"source\":\"security@android.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/07/14/2\",\"source\":\"security@android.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/07/19/2\",\"source\":\"security@android.com\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/07/19/7\",\"source\":\"security@android.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/07/25/7\",\"source\":\"security@android.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html\",\"source\":\"security@android.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240119-0012/\",\"source\":\"security@android.com\"},{\"url\":\"https://source.android.com/security/bulletin/pixel/2023-07-01\",\"source\":\"security@android.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5480\",\"source\":\"security@android.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/07/14/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/07/19/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/07/19/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/07/25/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240119-0012/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://source.android.com/security/bulletin/pixel/2023-07-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5480\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", }, }
fkie_cve-2023-21400
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
android | - | ||
debian | debian_linux | 10.0 | |
debian | debian_linux | 11.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", matchCriteriaId: "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", matchCriteriaId: "FA6FEEC2-9F11-4643-8827-749718254FED", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.", }, ], id: "CVE-2023-21400", lastModified: "2025-02-13T17:16:02.800", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-07-13T00:15:24.340", references: [ { source: "security@android.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html", }, { source: "security@android.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2023/07/14/2", }, { source: "security@android.com", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2023/07/19/2", }, { source: "security@android.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2023/07/19/7", }, { source: "security@android.com", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/7", }, { source: "security@android.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", }, { source: "security@android.com", url: "https://security.netapp.com/advisory/ntap-20240119-0012/", }, { source: "security@android.com", tags: [ "Vendor Advisory", ], url: "https://source.android.com/security/bulletin/pixel/2023-07-01", }, { source: "security@android.com", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2023/dsa-5480", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2023/07/14/2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2023/07/19/2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2023/07/19/7", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/7", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.netapp.com/advisory/ntap-20240119-0012/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://source.android.com/security/bulletin/pixel/2023-07-01", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2023/dsa-5480", }, ], sourceIdentifier: "security@android.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-667", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
suse-su-2023:3302-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-40982: Fixed transient execution attack called 'Gather Data Sampling' (bsc#1206418).\n- CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec (bsc#1211738).\n- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).\n- CVE-2023-20569: Fixed side channel attack ‘Inception’ or ‘RAS Poisoning’ (bsc#1213287).\n- CVE-2023-20593: Fixed a ZenBleed issue in 'Zen 2' CPUs that could allow an attacker to potentially access sensitive information (bsc#1213286).\n- CVE-2023-21400: Fixed several memory corruptions due to improper locking in io_uring (bsc#1213272).\n- CVE-2023-2156: Fixed a flaw in the networking subsystem within the handling of the RPL protocol (bsc#1211131).\n- CVE-2023-2166: Fixed NULL pointer dereference in can_rcv_filter (bsc#1210627).\n- CVE-2023-2430: Fixed amissing lock for IOPOLL in io_cqring_event_overflow() in io_uring.c that could allow a privileged user to cause a denial of service (bsc#1211014).\n- CVE-2023-2985: Fixed an use-after-free vulnerability in hfsplus_put_super in fs/hfsplus/super.c that could allow a local user to cause a denial of service (bsc#1211867).\n- CVE-2023-3090: Fixed a heap out-of-bounds write in the ipvlan network driver (bsc#1212842).\n- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).\n- CVE-2023-3111: Fixed a use-after-free vulnerability in prepare_to_relocate in fs/btrfs/relocation.c (bsc#1212051).\n- CVE-2023-3117: Fixed an use-after-free vulnerability in the netfilter subsystem when processing named and anonymous sets in batch requests that could allow a local user with CAP_NET_ADMIN capability to crash or potentially escalate their privileges on the system (bsc#1213245).\n- CVE-2023-31248: Fixed an use-after-free vulnerability in nft_chain_lookup_byid that could allow a local attacker to escalate their privilege (bsc#1213061).\n- CVE-2023-3212: Fixed a NULL pointer dereference flaw in the gfs2 file system (bsc#1212265).\n- CVE-2023-3268: Fixed an out of bounds memory access flaw in relay_file_read_start_pos in the relayfs (bsc#1212502).\n- CVE-2023-3389: Fixed a use-after-free vulnerability in the io_uring subsystem (bsc#1212838).\n- CVE-2023-3390: Fixed an use-after-free vulnerability in the netfilter subsystem in net/netfilter/nf_tables_api.c that could allow a local attacker with user access to cause a privilege escalation issue (bsc#1212846).\n- CVE-2023-35001: Fixed an out-of-bounds memory access flaw in nft_byteorder that could allow a local attacker to escalate their privilege (bsc#1213059).\n- CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c (bsc#1213167).\n- CVE-2023-3609: Fixed reference counter leak leading to overflow in net/sched (bsc#1213586).\n- CVE-2023-3611: Fixed an out-of-bounds write in net/sched sch_qfq(bsc#1213585).\n- CVE-2023-3776: Fixed improper refcount update in cls_fw leads to use-after-free (bsc#1213588).\n- CVE-2023-3812: Fixed an out-of-bounds memory access flaw in the TUN/TAP device driver functionality that could allow a local user to crash or potentially escalate their privileges on the system (bsc#1213543).\n- CVE-2023-38409: Fixed a use-after-free in drivers/video/fbdev/core/fbcon.c (bsc#1213417).\n- CVE-2023-3863: Fixed a use-after-free flaw in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC (bsc#1213601).\n- CVE-2023-4004: Fixed improper element removal netfilter nft_set_pipapo (bsc#1213812).\n\nThe following non-security bugs were fixed:\n\n- acpi/iort: remove erroneous id_count check in iort_node_get_rmr_info() (git-fixes).\n- acpi: cppc: add acpi disabled check to acpi_cpc_valid() (bsc#1212445).\n- acpi: cppc: add definition for undefined fadt preferred pm profile value (bsc#1212445).\n- acpi: fix suspend with xen pv (git-fixes).\n- acpi: utils: fix acpi_evaluate_dsm_typed() redefinition error (git-fixes).\n- add module_firmware() for firmware_tg357766 (git-fixes).\n- adreno: shutdown the gpu properly (git-fixes).\n- afs: adjust ack interpretation to try and cope with nat (git-fixes).\n- afs: fix access after dec in put functions (git-fixes).\n- afs: fix afs_getattr() to refetch file status if callback break occurred (git-fixes).\n- afs: fix dynamic root getattr (git-fixes).\n- afs: fix fileserver probe rtt handling (git-fixes).\n- afs: fix infinite loop found by xfstest generic/676 (git-fixes).\n- afs: fix lost servers_outstanding count (git-fixes).\n- afs: fix server->active leak in afs_put_server (git-fixes).\n- afs: fix setting of mtime when creating a file/dir/symlink (git-fixes).\n- afs: fix updating of i_size with dv jump from server (git-fixes).\n- afs: fix vlserver probe rtt handling (git-fixes).\n- afs: return -eagain, not -eremoteio, when a file already locked (git-fixes).\n- afs: use refcount_t rather than atomic_t (git-fixes).\n- afs: use the operation issue time instead of the reply time for callbacks (git-fixes).\n- alsa: ac97: fix possible null dereference in snd_ac97_mixer (git-fixes).\n- alsa: emu10k1: roll up loops in dsp setup code for audigy (git-fixes).\n- alsa: fireface: make read-only const array for model names static (git-fixes).\n- alsa: hda/realtek - remove 3k pull low procedure (git-fixes).\n- alsa: hda/realtek: add quirk for asus rog g614jx (git-fixes).\n- alsa: hda/realtek: add quirk for asus rog ga402x (git-fixes).\n- alsa: hda/realtek: add quirk for asus rog gx650p (git-fixes).\n- alsa: hda/realtek: add quirk for asus rog gz301v (git-fixes).\n- alsa: hda/realtek: add quirk for clevo npx0snx (git-fixes).\n- alsa: hda/realtek: add quirk for clevo ns70au (git-fixes).\n- alsa: hda/realtek: add quirks for rog ally cs35l41 audio (git-fixes).\n- alsa: hda/realtek: add quirks for unis h3c desktop b760 & q760 (git-fixes).\n- alsa: hda/realtek: add support for dell oasis 13/14/16 laptops (git-fixes).\n- alsa: hda/realtek: amend g634 quirk to enable rear speakers (git-fixes).\n- alsa: hda/realtek: enable mute led on hp laptop 15s-eq2xxx (git-fixes).\n- alsa: hda/realtek: enable mute/micmute leds and limit mic boost on elitebook (git-fixes).\n- alsa: hda/realtek: fix generic fixup definition for cs35l41 amp (git-fixes).\n- alsa: hda/realtek: support asus g713pv laptop (git-fixes).\n- alsa: hda/realtek: whitespace fix (git-fixes).\n- alsa: hda/relatek: enable mute led on hp 250 g8 (git-fixes).\n- alsa: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() (git-fixes).\n- alsa: hda: lnl: add hd audio pci id (git-fixes).\n- alsa: jack: fix mutex call in snd_jack_report() (git-fixes).\n- alsa: oxfw: make read-only const array models static (git-fixes).\n- alsa: pcm: fix potential data race at pcm memory allocation helpers (git-fixes).\n- alsa: usb-audio: add fixed_rate quirk for jbl quantum610 wireless (git-fixes).\n- alsa: usb-audio: add new quirk fixed_rate for jbl quantum810 wireless (git-fixes).\n- alsa: usb-audio: add quirk for microsoft modern wireless headset (bsc#1207129).\n- alsa: usb-audio: always initialize fixed_rate in snd_usb_find_implicit_fb_sync_format() (git-fixes).\n- alsa: usb-audio: apply mutex around snd_usb_endpoint_set_params() (git-fixes).\n- alsa: usb-audio: avoid superfluous endpoint setup (git-fixes).\n- alsa: usb-audio: avoid unnecessary interface change at ep close (git-fixes).\n- alsa: usb-audio: clear fixed clock rate at closing ep (git-fixes).\n- alsa: usb-audio: correct the return code from snd_usb_endpoint_set_params() (git-fixes).\n- alsa: usb-audio: drop superfluous interface setup at parsing (git-fixes).\n- alsa: usb-audio: fix possible null pointer dereference in snd_usb_pcm_has_fixed_rate() (git-fixes).\n- alsa: usb-audio: fix wrong kfree issue in snd_usb_endpoint_free_all (git-fixes).\n- alsa: usb-audio: more refactoring of hw constraint rules (git-fixes).\n- alsa: usb-audio: properly refcounting clock rate (git-fixes).\n- alsa: usb-audio: rate limit usb_set_interface error reporting (git-fixes).\n- alsa: usb-audio: refcount multiple accesses on the single clock (git-fixes).\n- alsa: usb-audio: split endpoint setups for hw_params and prepare (take#2) (git-fixes).\n- alsa: usb-audio: update for native dsd support quirks (git-fixes).\n- alsa: usb-audio: use atomic_try_cmpxchg in ep_state_update (git-fixes).\n- alsa: usb-audio: workaround for xrun at prepare (git-fixes).\n- amd-pstate: fix amd_pstate mode switch (git-fixes).\n- amdgpu: validate offset_in_bo of drm_amdgpu_gem_va (git-fixes).\n- apparmor: fix missing error check for rhashtable_insert_fast (git-fixes).\n- arm64/mm: mark private vm_fault_x defines as vm_fault_t (git-fixes)\n- arm64: add missing set/way cmo encodings (git-fixes).\n- arm64: dts: microchip: sparx5: do not use psci on reference boards (git-fixes)\n- arm64: vdso: pass (void *) to virt_to_page() (git-fixes)\n- arm64: xor-neon: mark xor_arm64_neon_*() static (git-fixes)\n- arm: dts: fix erroneous ads touchscreen polarities (git-fixes).\n- asoc: amd: acp: fix for invalid dai id handling in acp_get_byte_count() (git-fixes).\n- asoc: atmel: fix the 8k sample parameter in i2sc master (git-fixes).\n- asoc: codecs: es8316: fix dmic config (git-fixes).\n- asoc: codecs: wcd-mbhc-v2: fix resource leaks on component remove (git-fixes).\n- asoc: codecs: wcd934x: fix resource leaks on component remove (git-fixes).\n- asoc: codecs: wcd938x: fix codec initialisation race (git-fixes).\n- asoc: codecs: wcd938x: fix db range for hphl and hphr (git-fixes).\n- asoc: codecs: wcd938x: fix missing clsh ctrl error handling (git-fixes).\n- asoc: codecs: wcd938x: fix soundwire initialisation race (git-fixes).\n- asoc: da7219: check for failure reading aad irq events (git-fixes).\n- asoc: da7219: flush pending aad irq when suspending (git-fixes).\n- asoc: es8316: do not set rate constraints for unsupported mclks (git-fixes).\n- asoc: es8316: increment max value for alc capture target volume control (git-fixes).\n- asoc: fsl_sai: disable bit clock with transmitter (git-fixes).\n- asoc: fsl_spdif: silence output on stop (git-fixes).\n- asoc: imx-audmix: check return value of devm_kasprintf() (git-fixes).\n- asoc: intel: sof_sdw: remove sof_sdw_tgl_hdmi for meteorlake devices (git-fixes).\n- asoc: mediatek: mt8173: fix irq error path (git-fixes).\n- asoc: nau8824: add quirk to active-high jack-detect (git-fixes).\n- asoc: rt5640: fix sleep in atomic context (git-fixes).\n- asoc: rt5682-sdw: fix for jd event handling in clockstop mode0 (git-fixes).\n- asoc: rt711-sdca: fix for jd event handling in clockstop mode0 (git-fixes).\n- asoc: rt711: fix for jd event handling in clockstop mode0 (git-fixes).\n- asoc: simple-card: add missing of_node_put() in case of error (git-fixes).\n- asoc: sof: ipc3-dtrace: uninitialized data in dfsentry_trace_filter_write() (git-fixes).\n- asoc: sof: topology: fix logic for copying tuples (git-fixes).\n- asoc: tegra: fix adx byte map (git-fixes).\n- asoc: tegra: fix amx byte map (git-fixes).\n- asoc: wm8904: fill the cache for wm8904_adc_test_0 register (git-fixes).\n- ata: pata_ns87415: mark ns87560_tf_read static (git-fixes).\n- block, bfq: fix division by zero error on zero wsum (bsc#1213653).\n- block: fix a source code comment in include/uapi/linux/blkzoned.h (git-fixes).\n- bluetooth: fix invalid-bdaddr quirk for non-persistent setup (git-fixes).\n- bluetooth: fix use-bdaddr-property quirk (git-fixes).\n- bluetooth: hci_bcm: do not mark valid bd_addr as invalid (git-fixes).\n- bluetooth: hci_event: call disconnect callback before deleting conn (git-fixes).\n- bluetooth: hci_sync: avoid use-after-free in dbg for hci_remove_adv_monitor() (git-fixes).\n- bluetooth: iso: consider right cis when removing cig at cleanup (git-fixes).\n- bluetooth: iso: fix cig auto-allocation to select configurable cig (git-fixes).\n- bluetooth: iso: fix iso_conn related locking and validity issues (git-fixes).\n- bluetooth: iso: use hci_sync for setting cig parameters (git-fixes).\n- bluetooth: use rcu for hci_conn_params and iterate safely in hci_sync (git-fixes).\n- bonding: fix negative jump label count on nested bonding (bsc#1212685).\n- bus: fsl-mc: fsl-mc-allocator: drop a write-only variable (git-fixes).\n- bus: mhi: add new interfaces to handle mhi channels directly (bsc#1207948).\n- bus: mhi: host: add destroy_device argument to mhi_power_down() (bsc#1207948).\n- bus: ti-sysc: fix dispc quirk masking bool variables (git-fixes).\n- can: bcm: fix uaf in bcm_proc_show() (git-fixes).\n- can: gs_usb: gs_can_close(): add missing set of can state to can_state_stopped (git-fixes).\n- can: isotp: isotp_sendmsg(): fix return error fix on tx path (git-fixes).\n- can: kvaser_pciefd: remove handler for unused kvaser_pciefd_pack_type_eframe_ack (git-fixes).\n- can: kvaser_pciefd: remove useless write to interrupt register (git-fixes).\n- can: length: fix bitstuffing count (git-fixes).\n- can: length: fix description of the rrs field (git-fixes).\n- can: length: make header self contained (git-fixes).\n- ceph: add a dedicated private data for netfs rreq (bsc#1213205).\n- ceph: do not let check_caps skip sending responses for revoke msgs (bsc#1213856).\n- ceph: fix blindly expanding the readahead windows (bsc#1213206).\n- cifs: add a warning when the in-flight count goes negative (bsc#1193629).\n- cifs: address unused variable warning (bsc#1193629).\n- cifs: do all necessary checks for credits within or before locking (bsc#1193629).\n- cifs: fix lease break oops in xfstest generic/098 (bsc#1193629).\n- cifs: fix max_credits implementation (bsc#1193629).\n- cifs: fix session state check in reconnect to avoid use-after-free issue (bsc#1193629).\n- cifs: fix session state check in smb2_find_smb_ses (bsc#1193629).\n- cifs: fix session state transition to avoid use-after-free issue (bsc#1193629).\n- cifs: fix sockaddr comparison in iface_cmp (bsc#1193629).\n- cifs: fix status checks in cifs_tree_connect (bsc#1193629).\n- cifs: log session id when a matching ses is not found (bsc#1193629).\n- cifs: new dynamic tracepoint to track ses not found errors (bsc#1193629).\n- cifs: prevent use-after-free by freeing the cfile later (bsc#1193629).\n- cifs: print all credit counters in debugdata (bsc#1193629).\n- cifs: print client_guid in debugdata (bsc#1193629).\n- cifs: print more detail when invalidate_inode_mapping fails (bsc#1193629).\n- cifs: print nosharesock value while dumping mount options (bsc#1193629).\n- clk: cdce925: check return value of kasprintf() (git-fixes).\n- clk: fix memory leak in devm_clk_notifier_register() (git-fixes).\n- clk: imx: clk-imx8mn: fix memory leak in imx8mn_clocks_probe (git-fixes).\n- clk: imx: clk-imx8mp: improve error handling in imx8mp_clocks_probe() (git-fixes).\n- clk: imx: scu: use _safe list iterator to avoid a use after free (git-fixes).\n- clk: keystone: sci-clk: check return value of kasprintf() (git-fixes).\n- clk: qcom: camcc-sc7180: add parent dependency to all camera gdscs (git-fixes).\n- clk: qcom: gcc-ipq6018: use floor ops for sdcc clocks (git-fixes).\n- clk: samsung: add exynos4212 compatible to clkout driver (git-fixes).\n- clk: si5341: check return value of {devm_}kasprintf() (git-fixes).\n- clk: si5341: free unused memory on probe failure (git-fixes).\n- clk: si5341: return error if one synth clock registration fails (git-fixes).\n- clk: tegra: tegra124-emc: fix potential memory leak (git-fixes).\n- clk: ti: clkctrl: check return value of kasprintf() (git-fixes).\n- clk: vc5: check memory returned by kasprintf() (git-fixes).\n- coda: avoid partial allocation of sig_inputargs (git-fixes).\n- codel: fix kernel-doc notation warnings (git-fixes).\n- cpufreq: amd-pstate: add ->fast_switch() callback (bsc#1212445).\n- cpufreq: amd-pstate: add amd p-state frequencies attributes (bsc#1212445).\n- cpufreq: amd-pstate: add amd p-state performance attributes (bsc#1212445).\n- cpufreq: amd-pstate: add amd-pstate driver parameter for mode selection (bsc#1212445).\n- cpufreq: amd-pstate: add boost mode support for amd p-state (bsc#1212445).\n- cpufreq: amd-pstate: add driver working mode switch support (bsc#1212445).\n- cpufreq: amd-pstate: add fast switch function for amd p-state (bsc#1212445).\n- cpufreq: amd-pstate: add guided autonomous mode (bsc#1212445).\n- cpufreq: amd-pstate: add guided mode control support via sysfs (bsc#1212445).\n- cpufreq: amd-pstate: add more tracepoint for amd p-state module (bsc#1212445).\n- cpufreq: amd-pstate: add resume and suspend callbacks (bsc#1212445).\n- cpufreq: amd-pstate: add trace for amd p-state module (bsc#1212445).\n- cpufreq: amd-pstate: avoid uninitialized variable use (bsc#1212445).\n- cpufreq: amd-pstate: change amd-pstate driver to be built-in type (bsc#1212445).\n- cpufreq: amd-pstate: convert sprintf with sysfs_emit() (bsc#1212445).\n- cpufreq: amd-pstate: cpufreq: amd-pstate: reset msr_amd_perf_ctl register at init (bsc#1212445).\n- cpufreq: amd-pstate: expose struct amd_cpudata (bsc#1212445).\n- cpufreq: amd-pstate: fix initial highest_perf value (bsc#1212445).\n- cpufreq: amd-pstate: fix invalid write to msr_amd_cppc_req (bsc#1212445).\n- cpufreq: amd-pstate: fix kconfig dependencies for amd p-state (bsc#1212445).\n- cpufreq: amd-pstate: fix kernel hang issue while amd-pstate unregistering (bsc#1212445).\n- cpufreq: amd-pstate: fix struct amd_cpudata kernel-doc comment (bsc#1212445).\n- cpufreq: amd-pstate: fix white-space (bsc#1212445).\n- cpufreq: amd-pstate: implement amd pstate cpu online and offline callback (bsc#1212445).\n- cpufreq: amd-pstate: implement pstate epp support for the amd processors (bsc#1212445).\n- cpufreq: amd-pstate: implement suspend and resume callbacks (bsc#1212445).\n- cpufreq: amd-pstate: introduce a new amd p-state driver to support future processors (bsc#1212445).\n- cpufreq: amd-pstate: introduce the support for the processors with shared memory solution (bsc#1212445).\n- cpufreq: amd-pstate: let user know amd-pstate is disabled (bsc#1212445).\n- cpufreq: amd-pstate: make amd-pstate epp driver name hyphenated (bsc#1212445).\n- cpufreq: amd-pstate: make varaiable mode_state_machine static (bsc#1212445).\n- cpufreq: amd-pstate: optimize driver working mode selection in amd_pstate_param() (bsc#1212445).\n- cpufreq: amd-pstate: remove fast_switch_possible flag from active driver (bsc#1212445).\n- cpufreq: amd-pstate: remove module_license in non-modules (bsc#1212445).\n- cpufreq: amd-pstate: set a fallback policy based on preferred_profile (bsc#1212445).\n- cpufreq: amd-pstate: simplify cpudata pointer assignment (bsc#1212445).\n- cpufreq: amd-pstate: update policy->cur in amd_pstate_adjust_perf() (bsc#1212445).\n- cpufreq: amd-pstate: update pstate frequency transition delay time (bsc#1212445).\n- cpufreq: amd-pstate: write cppc enable bit per-socket (bsc#1212445).\n- cpufreq: amd_pstate: fix wrong lowest perf fetch (bsc#1212445).\n- cpufreq: amd_pstate: map desired perf into pstate scope for powersave governor (bsc#1212445).\n- cpufreq: tegra194: fix module loading (git-fixes).\n- crypto: kpp - add helper to set reqsize (git-fixes).\n- crypto: marvell/cesa - fix type mismatch warning (git-fixes).\n- crypto: nx - fix build warnings when debug_fs is not enabled (git-fixes).\n- crypto: qat - use helper to set reqsize (git-fixes).\n- delete suse/memcg-drop-kmem-limit_in_bytes. drop the patch in order to fix bsc#1213705.\n- devlink: fix kernel-doc notation warnings (git-fixes).\n- dlm: fix missing lkb refcount handling (git-fixes).\n- dlm: fix plock invalid read (git-fixes).\n- dma-buf/dma-resv: stop leaking on krealloc() failure (git-fixes).\n- docs: networking: update codeaurora references for rmnet (git-fixes).\n- documentation: abi: sysfs-class-net-qmi: pass_through contact update (git-fixes).\n- documentation: bonding: fix the doc of peer_notif_delay (git-fixes).\n- documentation: cpufreq: amd-pstate: move amd_pstate param to alphabetical order (bsc#1212445).\n- documentation: devices.txt: reconcile serial/ucc_uart minor numers (git-fixes).\n- documentation: timers: hrtimers: make hybrid union historical (git-fixes).\n- drivers: meson: secure-pwrc: always enable dma domain (git-fixes).\n- drm/amd/amdgpu: introduce gc_*_mes_2.bin v2 (git-fixes).\n- drm/amd/amdgpu: limit one queue per gang (git-fixes).\n- drm/amd/amdgpu: update mes11 api def (git-fixes).\n- drm/amd/display (gcc13): fix enum mismatch (git-fixes).\n- drm/amd/display: add a null pointer check (bsc#1212848, bsc#1212961).\n- drm/amd/display: add debug option to skip psr crtc disable (git-fixes).\n- drm/amd/display: add logging for display mall refresh setting (git-fixes).\n- drm/amd/display: add minimal pipe split transition state (git-fixes).\n- drm/amd/display: add minimum z8 residency debug option (git-fixes).\n- drm/amd/display: add missing wa and mclk validation (git-fixes).\n- drm/amd/display: add monitor specific edid quirk (git-fixes).\n- drm/amd/display: add polling method to handle mst reply packet (bsc#1213578).\n- drm/amd/display: add wrapper to call planes and stream update (git-fixes).\n- drm/amd/display: add z8 allow states to z-state support list (git-fixes).\n- drm/amd/display: change default z8 watermark values (git-fixes).\n- drm/amd/display: check tg is non-null before checking if enabled (git-fixes).\n- drm/amd/display: correct `dmub_fw_version` macro (git-fixes).\n- drm/amd/display: correct dml calculation to align hw formula (git-fixes).\n- drm/amd/display: correct dml calculation to follow hw spec (git-fixes).\n- drm/amd/display: disable mpc split by default on special asic (git-fixes).\n- drm/amd/display: disable seamless boot if force_odm_combine is enabled (bsc#1212848, bsc#1212961).\n- drm/amd/display: do not update drr while bw optimizations pending (git-fixes).\n- drm/amd/display: drop redundant memset() in get_available_dsc_slices() (git-fixes).\n- drm/amd/display: enable hostvm based on riommu active (git-fixes).\n- drm/amd/display: enforce 60us prefetch for 200mhz dcfclk modes (git-fixes).\n- drm/amd/display: ensure vmin and vmax adjust for dce (git-fixes).\n- drm/amd/display: explicitly specify update type per plane info change (git-fixes).\n- drm/amd/display: filter out invalid bits in pipe_fuses (git-fixes).\n- drm/amd/display: fix 4to1 mpc black screen with dpp rco (git-fixes).\n- drm/amd/display: fix a divided-by-zero error (git-fixes).\n- drm/amd/display: fix a test calculateprefetchschedule() (git-fixes).\n- drm/amd/display: fix a test dml32_rq_dlg_get_rq_reg() (git-fixes).\n- drm/amd/display: fix access hdcp_workqueue assert (git-fixes).\n- drm/amd/display: fix artifacting on edp panels when engaging freesync video mode (git-fixes).\n- drm/amd/display: fix psr-su/dsc interoperability support (git-fixes).\n- drm/amd/display: fix seamless odm transitions (git-fixes).\n- drm/amd/display: fix the system hang while disable psr (git-fixes).\n- drm/amd/display: fix z8 support configurations (git-fixes).\n- drm/amd/display: fixed dcn30+ underflow issue (git-fixes).\n- drm/amd/display: have payload properly created after resume (git-fixes).\n- drm/amd/display: keep phy active for dp displays on dcn31 (git-fixes).\n- drm/amd/display: limit timing for single dimm memory (git-fixes).\n- drm/amd/display: lowering min z8 residency time (git-fixes).\n- drm/amd/display: only update link settings after successful mst link train (git-fixes).\n- drm/amd/display: phase3 mst hdcp for multiple displays (git-fixes).\n- drm/amd/display: populate subvp cmd info only for the top pipe (git-fixes).\n- drm/amd/display: reduce sdp bw after urgent to 90% (git-fixes).\n- drm/amd/display: refactor edp psr codes (git-fixes).\n- drm/amd/display: remove fpu guards from the dml folder (git-fixes).\n- drm/amd/display: remove optimization for vrr updates (git-fixes).\n- drm/amd/display: remove phantom pipe check when calculating k1 and k2 (git-fixes).\n- drm/amd/display: remove stutter only configurations (git-fixes).\n- drm/amd/display: save restore hdcp state when display is unplugged from mst hub (git-fixes).\n- drm/amd/display: set dcn315 lb bpp to 48 (git-fixes).\n- drm/amd/display: unlock on error path in dm_handle_mst_sideband_msg_ready_event() (git-fixes).\n- drm/amd/display: update minimum stutter residency for dcn314 z8 (git-fixes).\n- drm/amd/display: update z8 sr exit/enter latencies (git-fixes).\n- drm/amd/display: update z8 watermarks for dcn314 (git-fixes).\n- drm/amd/display: use dc_update_planes_and_stream (git-fixes).\n- drm/amd/pm: add abnormal fan detection for smu 13.0.0 (git-fixes).\n- drm/amd/pm: add missing notifypowersource message mapping for smu13.0.7 (git-fixes).\n- drm/amd/pm: avoid potential ubsan issue on legacy asics (git-fixes).\n- drm/amd/pm: conditionally disable pcie lane switching for some sienna_cichlid skus (git-fixes).\n- drm/amd/pm: conditionally disable pcie lane/speed switching for smu13 (git-fixes).\n- drm/amd/pm: fix possible power mode mismatch between driver and pmfw (git-fixes).\n- drm/amd/pm: re-enable the gfx imu when smu resume (git-fixes).\n- drm/amd/pm: resolve reboot exception for si oland (git-fixes).\n- drm/amd/pm: reverse mclk and fclk clocks levels for smu v13.0.4 (git-fixes).\n- drm/amd/pm: reverse mclk clocks levels for smu v13.0.5 (git-fixes).\n- drm/amd/pm: revise the aspm settings for thunderbolt attached scenario (bsc#1212848, bsc#1212961).\n- drm/amd/pm: share the code around smu13 pcie parameters update (git-fixes).\n- drm/amd/pm: update the lc_l1_inactivity setting to address possible noise issue (bsc#1212848, bsc#1212961).\n- drm/amd/pm: workaround for compute workload type on some skus (git-fixes).\n- drm/amd: add a new helper for loading/validating microcode (git-fixes).\n- drm/amd: disable psr-su on parade 0803 tcon (bsc#1212848, bsc#1212961).\n- drm/amd: do not allow s0ix on apus older than raven (git-fixes).\n- drm/amd: do not try to enable secure display ta multiple times (bsc#1212848, bsc#1212961).\n- drm/amd: fix an error handling mistake in psp_sw_init() (git-fixes).\n- drm/amd: load mes microcode during early_init (git-fixes).\n- drm/amd: use `amdgpu_ucode_*` helpers for mes (git-fixes).\n- drm/amdgpu/gfx11: adjust gfxoff before powergating on gfx11 as well (git-fixes).\n- drm/amdgpu/gfx11: update gpu_clock_counter logic (git-fixes).\n- drm/amdgpu/gfx: set cg flags to enter/exit safe mode (git-fixes).\n- drm/amdgpu/gmc11: implement get_vbios_fb_size() (git-fixes).\n- drm/amdgpu/jpeg: remove harvest checking for jpeg3 (git-fixes).\n- drm/amdgpu/mes11: enable reg active poll (git-fixes).\n- drm/amdgpu/vcn: disable indirect sram on vangogh broken bioses (git-fixes).\n- drm/amdgpu/vkms: relax timer deactivation by hrtimer_try_to_cancel (git-fixes).\n- drm/amdgpu: add mes resume when do gfx post soft reset (git-fixes).\n- drm/amdgpu: add the fan abnormal detection feature (git-fixes).\n- drm/amdgpu: avoid restore process run into dead loop (git-fixes).\n- drm/amdgpu: change reserved vram info print (git-fixes).\n- drm/amdgpu: declare firmware for new mes 11.0.4 (git-fixes).\n- drm/amdgpu: do not set struct drm_driver.output_poll_changed (git-fixes).\n- drm/amdgpu: enable tmz by default for gc 11.0.1 (git-fixes).\n- drm/amdgpu: fix amdgpu_irq_put call trace in gmc_v10_0_hw_fini (git-fixes).\n- drm/amdgpu: fix amdgpu_irq_put call trace in gmc_v11_0_hw_fini (git-fixes).\n- drm/amdgpu: fix an amdgpu_irq_put() issue in gmc_v9_0_hw_fini() (git-fixes).\n- drm/amdgpu: fix clearing mappings for bos that are always valid in vm (bsc#1212848, bsc#1212961).\n- drm/amdgpu: fix clearing mappings for bos that are always valid in vm (git-fixes).\n- drm/amdgpu: fix desktop freezed after gpu-reset (git-fixes).\n- drm/amdgpu: fix memcpy() in sienna_cichlid_append_powerplay_table function (git-fixes).\n- drm/amdgpu: fix minmax warning (git-fixes).\n- drm/amdgpu: fix number of fence calculations (bsc#1212848, bsc#1212961).\n- drm/amdgpu: fix sdma v4 sw fini error (git-fixes).\n- drm/amdgpu: fix usage of umc fill record in ras (git-fixes).\n- drm/amdgpu: force signal hw_fences that are embedded in non-sched jobs (git-fixes).\n- drm/amdgpu: refine get gpu clock counter method (git-fixes).\n- drm/amdgpu: remove deprecated mes version vars (git-fixes).\n- drm/amdgpu: reserve the old gc_11_0_*_mes.bin (git-fixes).\n- drm/amdgpu: set gfx9 onwards apu atomics support to be true (git-fixes).\n- drm/amdgpu: set vmbo destroy after pt bo is created (git-fixes).\n- drm/amdgpu: validate vm ioctl flags (git-fixes).\n- drm/amdgpu: vcn_4_0 set instance 0 init sched score to 1 (git-fixes).\n- drm/amdkfd: fix potential deallocation of previously deallocated memory (git-fixes).\n- drm/atomic: fix potential use-after-free in nonblocking commits (git-fixes).\n- drm/bridge: anx7625: convert to i2c's .probe_new() (git-fixes).\n- drm/bridge: anx7625: fix refcount bug in anx7625_parse_dt() (git-fixes).\n- drm/bridge: anx7625: prevent endless probe loop (git-fixes).\n- drm/bridge: it6505: move a variable assignment behind a null pointer check in receive_timing_debugfs_show() (git-fixes).\n- drm/bridge: tc358767: switch to devm mipi-dsi helpers (git-fixes).\n- drm/bridge: tc358768: add atomic_get_input_bus_fmts() implementation (git-fixes).\n- drm/bridge: tc358768: always enable hs video mode (git-fixes).\n- drm/bridge: tc358768: fix pll parameters computation (git-fixes).\n- drm/bridge: tc358768: fix pll target frequency (git-fixes).\n- drm/bridge: tc358768: fix tclk_trailcnt computation (git-fixes).\n- drm/bridge: tc358768: fix tclk_zerocnt computation (git-fixes).\n- drm/bridge: tc358768: fix ths_trailcnt computation (git-fixes).\n- drm/bridge: tc358768: fix ths_zerocnt computation (git-fixes).\n- drm/bridge: tc358768: fix txtagocnt computation (git-fixes).\n- drm/bridge: ti-sn65dsi83: fix enable error path (git-fixes).\n- drm/bridge: ti-sn65dsi86: fix auxiliary bus lifetime (git-fixes).\n- drm/client: fix memory leak in drm_client_modeset_probe (git-fixes).\n- drm/client: fix memory leak in drm_client_target_cloned (git-fixes).\n- drm/display/dp_mst: fix payload addition on a disconnected sink (git-fixes).\n- drm/display: do not block hdr_output_metadata on unknown eotf (git-fixes).\n- drm/dp_mst: clear msg_rdy flag before sending new message (bsc#1213578).\n- drm/drm_vma_manager: add drm_vma_node_allow_once() (git-fixes).\n- drm/dsc: fix dp_dsc_max_bpp_delta_* macro values (git-fixes).\n- drm/dsc: fix drm_edp_dsc_sink_output_bpp() dpcd high byte usage (git-fixes).\n- drm/etnaviv: move idle mapping reaping into separate function (git-fixes).\n- drm/etnaviv: reap idle mapping if it does not match the softpin address (git-fixes).\n- drm/exynos: fix race condition uaf in exynos_g2d_exec_ioctl (git-fixes).\n- drm/exynos: vidi: fix a wrong error return (git-fixes).\n- drm/i915/dp_mst: add the mst topology state for modesetted crtcs (bsc#1213493).\n- drm/i915/dpt: use shmem for dpt objects (git-fixes).\n- drm/i915/fbdev: lock the fbdev obj before vma pin (git-fixes).\n- drm/i915/gt: cleanup partial engine discovery failures (git-fixes).\n- drm/i915/guc: add error-capture init warnings when needed (git-fixes).\n- drm/i915/guc: fix missing ecodes (git-fixes).\n- drm/i915/guc: limit scheduling properties to avoid overflow (git-fixes).\n- drm/i915/guc: rename guc register state capture node to be more obvious (git-fixes).\n- drm/i915/gvt: remove unused variable gma_bottom in command parser (git-fixes).\n- drm/i915/mtl: update scaler source and destination limits for mtl (git-fixes).\n- drm/i915/psr: use hw.adjusted mode when calculating io/fast wake times (git-fixes).\n- drm/i915/sdvo: grab mode_config.mutex during lvds init to avoid warns (git-fixes).\n- drm/i915/sseu: fix max_subslices array-index-out-of-bounds access (git-fixes).\n- drm/i915/tc: fix system resume mst mode restore for dp-alt sinks (git-fixes).\n- drm/i915/tc: fix tc port link ref init for dp mst during hw readout (git-fixes).\n- drm/i915: allow panel fixed modes to have differing sync polarities (git-fixes).\n- drm/i915: check pipe source size when using skl+ scalers (git-fixes).\n- drm/i915: do not preserve dpll_hw_state for slave crtc in bigjoiner (git-fixes).\n- drm/i915: do panel vbt init early if the vbt declares an explicit panel type (git-fixes).\n- drm/i915: fix a memory leak with reused mmap_offset (git-fixes).\n- drm/i915: fix an error handling path in igt_write_huge() (git-fixes).\n- drm/i915: fix negative value passed as remaining time (git-fixes).\n- drm/i915: fix one wrong caching mode enum usage (git-fixes).\n- drm/i915: fix typec mode initialization during system resume (git-fixes).\n- drm/i915: introduce intel_panel_init_alloc() (git-fixes).\n- drm/i915: never return 0 if not all requests retired (git-fixes).\n- drm/i915: populate encoder->devdata for dsi on icl+ (git-fixes).\n- drm/i915: print return value on error (git-fixes).\n- drm/i915: use _mmio_pipe() for skl_bottom_color (git-fixes).\n- drm/meson: fix return type of meson_encoder_cvbs_mode_valid() (git-fixes).\n- drm/msm/a5xx: really check for a510 in a5xx_gpu_init (git-fixes).\n- drm/msm/adreno: fix runtime pm imbalance at unbind (git-fixes).\n- drm/msm/adreno: fix snapshot bindless_data size (git-fixes).\n- drm/msm/adreno: fix sparse warnings in a6xx code (git-fixes).\n- drm/msm/adreno: simplify read64/write64 helpers (git-fixes).\n- drm/msm/disp/dpu: get timing engine status from intf status register (git-fixes).\n- drm/msm/dp: free resources after unregistering them (git-fixes).\n- drm/msm/dpu: add dsc hardware blocks to register snapshot (git-fixes).\n- drm/msm/dpu: assign missing writeback log_mask (git-fixes).\n- drm/msm/dpu: clean up dpu_kms_get_clk_rate() returns (git-fixes).\n- drm/msm/dpu: correct merge_3d length (git-fixes).\n- drm/msm/dpu: do not enable color-management if dspps are not available (git-fixes).\n- drm/msm/dpu: drop enum dpu_core_perf_data_bus_id (git-fixes).\n- drm/msm/dpu: set dpu_data_hctl_en for in intf_sc7180_mask (git-fixes).\n- drm/msm/dpu: set dsc flush bit correctly at mdp ctl flush register (git-fixes).\n- drm/msm/dsi: do not allow enabling 14nm vco with unprogrammed rate (git-fixes).\n- drm/msm/hdmi: use devres helper for runtime pm management (git-fixes).\n- drm/msm: fix is_err_or_null() vs null check in a5xx_submit_in_rb() (git-fixes).\n- drm/panel: boe-tv101wum-nl6: ensure dsi writes succeed during disable (git-fixes).\n- drm/panel: sharp-ls043t1le01: adjust mode settings (git-fixes).\n- drm/panel: simple: add connector_type for innolux_at043tn24 (git-fixes).\n- drm/panel: simple: add powertip ph800480t013 drm_display_mode flags (git-fixes).\n- drm/panel: simple: fix active size for ampire am-480272h3tmqw-t01h (git-fixes).\n- drm/radeon: fix integer overflow in radeon_cs_parser_init (git-fixes).\n- drm/radeon: fix possible division-by-zero errors (git-fixes).\n- drm/radeon: fix race condition uaf in radeon_gem_set_domain_ioctl (git-fixes).\n- drm/rockchip: dw_hdmi: cleanup drm encoder during unbind (git-fixes).\n- drm/rockchip: vop: leave vblank enabled in self-refresh (git-fixes).\n- drm/ttm: do not leak a resource on swapout move error (git-fixes).\n- drm/ttm: fix bulk_move corruption when adding a entry (git-fixes).\n- drm/ttm: fix warning that we shouldn't mix && and || (git-fixes).\n- drm/virtio: fix memory leak in virtio_gpu_object_create() (git-fixes).\n- drm/virtio: simplify error handling of virtio_gpu_object_create() (git-fixes).\n- drm/vmwgfx: fix legacy display unit atomic drm support (bsc#1213632).\n- drm/vmwgfx: refactor resource manager's hashtable to use linux/hashtable implementation (git-fixes).\n- drm/vmwgfx: refactor resource validation hashtable to use linux/hashtable implementation (git-fixes).\n- drm/vmwgfx: refactor ttm reference object hashtable to use linux/hashtable (git-fixes).\n- drm/vmwgfx: remove explicit and broken vblank handling (bsc#1213632).\n- drm/vmwgfx: remove rcu locks from user resources (bsc#1213632).\n- drm/vmwgfx: remove ttm object hashtable (git-fixes).\n- drm/vmwgfx: remove vmwgfx_hashtab (git-fixes).\n- drm/vmwgfx: write the driver id registers (git-fixes).\n- drm/vram-helper: fix function names in vram helper doc (git-fixes).\n- drm: add fixed-point helper to get rounded integer values (git-fixes).\n- drm: add missing dp dsc extended capability definitions (git-fixes).\n- drm: buddy_allocator: fix buddy allocator init on 32-bit systems (git-fixes).\n- drm: optimize drm buddy top-down allocation method (git-fixes).\n- drm: panel-orientation-quirks: add quirk for dynabook k50 (git-fixes).\n- drm: rcar-du: add quirk for h3 es1.x pclk workaround (git-fixes).\n- drm: rcar-du: fix setting a reserved bit in dpllcr (git-fixes).\n- drm: sun4i_tcon: use devm_clk_get_enabled in `sun4i_tcon_init_clocks` (git-fixes).\n- drm: use mgr->dev in drm_dbg_kms in drm_dp_add_payload_part2 (git-fixes).\n- drop amdgpu patches for fixing regression (bsc#1213304,bsc#1213777).\n- dt-bindings: phy: brcm,brcmstb-usb-phy: fix error in 'compatible' conditional schema (git-fixes).\n- elf: correct note name comment (git-fixes).\n- enable nxp snvs rtc driver for i.mx 8mq/8mp (jsc#ped-4758)\n- ext4: add ea_inode checking to ext4_iget() (bsc#1213106).\n- ext4: add ext4_sb_block_valid() refactored out of ext4_inode_block_valid() (bsc#1213088).\n- ext4: add lockdep annotations for i_data_sem for ea_inode's (bsc#1213109).\n- ext4: add strict range checks while freeing blocks (bsc#1213089).\n- ext4: avoid deadlock in fs reclaim with page writeback (bsc#1213016).\n- ext4: bail out of ext4_xattr_ibody_get() fails for any reason (bsc#1213018).\n- ext4: block range must be validated before use in ext4_mb_clear_bb() (bsc#1213090).\n- ext4: check iomap type only if ext4_iomap_begin() does not fail (bsc#1213103).\n- ext4: disallow ea_inodes with extended attributes (bsc#1213108).\n- ext4: fail ext4_iget if special inode unallocated (bsc#1213010).\n- ext4: fix bug_on in __es_tree_search caused by bad quota inode (bsc#1213111).\n- ext4: fix data races when using cached status extents (bsc#1213102).\n- ext4: fix deadlock when converting an inline directory in nojournal mode (bsc#1213105).\n- ext4: fix i_disksize exceeding i_size problem in paritally written case (bsc#1213015).\n- ext4: fix lockdep warning when enabling mmp (bsc#1213100).\n- ext4: fix reusing stale buffer heads from last failed mounting (bsc#1213020).\n- ext4: fix task hung in ext4_xattr_delete_inode (bsc#1213096).\n- ext4: fix to check return value of freeze_bdev() in ext4_shutdown() (bsc#1213021).\n- ext4: fix use-after-free read in ext4_find_extent for bigalloc + inline (bsc#1213098).\n- ext4: fix warning in ext4_update_inline_data (bsc#1213012).\n- ext4: fix warning in mb_find_extent (bsc#1213099).\n- ext4: improve error handling from ext4_dirhash() (bsc#1213104).\n- ext4: improve error recovery code paths in __ext4_remount() (bsc#1213017).\n- ext4: move where set the may_inline_data flag is set (bsc#1213011).\n- ext4: only update i_reserved_data_blocks on successful block allocation (bsc#1213019).\n- ext4: refactor ext4_free_blocks() to pull out ext4_mb_clear_bb() (bsc#1213087).\n- ext4: refuse to create ea block when umounted (bsc#1213093).\n- ext4: set lockdep subclass for the ea_inode in ext4_xattr_inode_cache_find() (bsc#1213107).\n- ext4: turn quotas off if mount failed after enabling quotas (bsc#1213110).\n- ext4: update s_journal_inum if it changes after journal replay (bsc#1213094).\n- ext4: use ext4_fc_tl_mem in fast-commit replay path (bsc#1213092).\n- ext4: zero i_disksize when initializing the bootloader inode (bsc#1213013).\n- extcon: fix kernel doc of property capability fields to avoid warnings (git-fixes).\n- extcon: fix kernel doc of property fields to avoid warnings (git-fixes).\n- extcon: usbc-tusb320: add usb type-c support (git-fixes).\n- extcon: usbc-tusb320: call the type-c irq handler only if a port is registered (git-fixes).\n- extcon: usbc-tusb320: unregister typec port on driver removal (git-fixes).\n- extcon: usbc-tusb320: update state on probe even if no irq pending (git-fixes).\n- fbdev: au1200fb: fix missing irq check in au1200fb_drv_probe (git-fixes).\n- fbdev: imxfb: removed unneeded release_mem_region (git-fixes).\n- fbdev: imxfb: warn about invalid left/right margin (git-fixes).\n- fbdev: omapfb: lcd_mipid: fix an error handling path in mipid_spi_probe() (git-fixes).\n- file: always lock position for fmode_atomic_pos (bsc#1213759).\n- firmware: stratix10-svc: fix a potential resource leak in svc_create_memory_pool() (git-fixes).\n- fix documentation of panic_on_warn (git-fixes).\n- fix null pointer dereference in drm_dp_atomic_find_time_slots() (bsc#1213578).\n- fs: dlm: add midcomms init/start functions (git-fixes).\n- fs: dlm: do not set stop rx flag after node reset (git-fixes).\n- fs: dlm: filter user dlm messages for kernel locks (git-fixes).\n- fs: dlm: fix log of lowcomms vs midcomms (git-fixes).\n- fs: dlm: fix race between test_bit() and queue_work() (git-fixes).\n- fs: dlm: fix race in lowcomms (git-fixes).\n- fs: dlm: handle -ebusy first in lock arg validation (git-fixes).\n- fs: dlm: move sending fin message into state change handling (git-fixes).\n- fs: dlm: retry accept() until -eagain or error returns (git-fixes).\n- fs: dlm: return positive pid value for f_getlk (git-fixes).\n- fs: dlm: start midcomms before scand (git-fixes).\n- fs: hfsplus: remove warn_on() from hfsplus_cat_{read,write}_inode() (git-fixes).\n- fs: jfs: check for read-only mounted filesystem in txbegin (git-fixes).\n- fs: jfs: fix null-ptr-deref read in txbegin (git-fixes).\n- fs: jfs: fix ubsan: array-index-out-of-bounds in dballocdmaplev (git-fixes).\n- fuse: ioctl: translate enosys in outarg (bsc#1213524).\n- fuse: revalidate: do not invalidate if interrupted (bsc#1213523).\n- get module prefix from kmod (bsc#1212835).\n- gve: set default duplex configuration to full (git-fixes).\n- gve: unify driver name usage (git-fixes).\n- hid: logitech-hidpp: add hidpp_quirk_delayed_init for the t651 (git-fixes).\n- hid: wacom: add error check to wacom_parse_and_register() (git-fixes).\n- hvcs: fix hvcs port reference counting (bsc#1213134 ltc#202861).\n- hvcs: get reference to tty in remove (bsc#1213134 ltc#202861).\n- hvcs: synchronize hotplug remove with port free (bsc#1213134 ltc#202861).\n- hvcs: use dev_groups to manage hvcs device attributes (bsc#1213134 ltc#202861).\n- hvcs: use driver groups to manage driver attributes (bsc#1213134 ltc#202861).\n- hvcs: use vhangup in hotplug remove (bsc#1213134 ltc#202861).\n- hwmon: (adm1275) allow setting sample averaging (git-fixes).\n- hwmon: (gsc-hwmon) fix fan pwm temperature scaling (git-fixes).\n- hwmon: (k10temp) enable amd3255 proc to show negative temperature (git-fixes).\n- hwmon: (nct7802) fix for temp6 (peci1) processed even if peci1 disabled (git-fixes).\n- hwmon: (pmbus/adm1275) fix problems with temperature monitoring on adm1272 (git-fixes).\n- hwrng: imx-rngc - fix the timeout for init and self check (git-fixes).\n- hwrng: st - keep clock enabled while hwrng is registered (git-fixes).\n- i2c: tegra: set acpi node as primary fwnode (bsc#1213226).\n- i2c: xiic: defer xiic_wakeup() and __xiic_start_xfer() in xiic_process() (git-fixes).\n- i2c: xiic: do not try to handle more interrupt events after error (git-fixes).\n- iavf: check for removal state before iavf_flag_pf_comms_failed (git-fixes).\n- iavf: fix a deadlock caused by rtnl and driver's lock circular dependencies (git-fixes).\n- iavf: fix out-of-bounds when setting channels on remove (git-fixes).\n- iavf: fix potential deadlock on allocation failure (git-fixes).\n- iavf: fix reset task race with iavf_remove() (git-fixes).\n- iavf: fix use-after-free in free_netdev (git-fixes).\n- iavf: move netdev_update_features() into watchdog task (git-fixes).\n- iavf: use internal state to free traffic irqs (git-fixes).\n- iavf: wait for reset in callbacks which trigger it (git-fixes).\n- ib/hfi1: fix wrong mmu_node used for user sdma packet after invalidate (git-fixes)\n- ib/hfi1: use bitmap_zalloc() when applicable (git-fixes)\n- ib/isert: fix dead lock in ib_isert (git-fixes)\n- ib/isert: fix incorrect release of isert connection (git-fixes)\n- ib/isert: fix possible list corruption in cma handler (git-fixes)\n- ib/uverbs: fix to consider event queue closing also upon non-blocking mode (git-fixes)\n- ibmvnic: do not reset dql stats on non_fatal err (bsc#1212603 ltc#202604).\n- ice: fix max_rate check while configuring tx rate limits (git-fixes).\n- ice: fix memory management in ice_ethtool_fdir.c (git-fixes).\n- ice: handle extts in the miscellaneous interrupt thread (git-fixes).\n- igc: check if hardware tx timestamping is enabled earlier (git-fixes).\n- igc: enable and fix rx hash usage by netstack (git-fixes).\n- igc: fix inserting of empty frame for launchtime (git-fixes).\n- igc: fix kernel panic during ndo_tx_timeout callback (git-fixes).\n- igc: fix launchtime before start of cycle (git-fixes).\n- igc: fix race condition in ptp tx code (git-fixes).\n- igc: handle pps start time programming for past time values (git-fixes).\n- igc: prevent garbled tx queue with xdp zerocopy (git-fixes).\n- igc: remove delay during tx ring configuration (git-fixes).\n- igc: set tp bit in 'supported' and 'advertising' fields of ethtool_link_ksettings (git-fixes).\n- igc: work around hw bug causing missing timestamps (git-fixes).\n- iio: accel: fxls8962af: errata bug only applicable for fxls8962af (git-fixes).\n- iio: accel: fxls8962af: fixup buffer scan element type (git-fixes).\n- iio: adc: ad7192: fix internal/external clock selection (git-fixes).\n- iio: adc: ad7192: fix null ad7192_state pointer access (git-fixes).\n- inotify: avoid reporting event with invalid wd (bsc#1213025).\n- input: adxl34x - do not hardcode interrupt trigger type (git-fixes).\n- input: drv260x - fix typo in register value define (git-fixes).\n- input: drv260x - remove unused .reg_defaults (git-fixes).\n- input: drv260x - sleep between polling go bit (git-fixes).\n- input: i8042 - add clevo pcx0dx to i8042 quirk table (git-fixes).\n- input: iqs269a - do not poll during ati (git-fixes).\n- input: iqs269a - do not poll during suspend or resume (git-fixes).\n- input: soc_button_array - add invalid acpi_index dmi quirk handling (git-fixes).\n- integrity: fix possible multiple allocation in integrity_inode_get() (git-fixes).\n- io_uring: do not expose io_fill_cqe_aux() (bsc#1211014).\n- irqchip/gic-v3: claim iomem resources (bsc#1213533)\n- irqchip/gicv3: handle resource request failure consistently (bsc#1213533)\n- irqchip/gicv3: workaround for nvidia erratum t241-fabric-4 (bsc#1213533)\n- jbd2: fix data missing when reusing bh which is ready to be checkpointed (bsc#1213095).\n- jdb2: do not refuse invalidation of already invalidated buffers (bsc#1213014).\n- jffs2: fix memory leak in jffs2_do_fill_super (git-fixes).\n- jffs2: fix memory leak in jffs2_do_mount_fs (git-fixes).\n- jffs2: fix memory leak in jffs2_scan_medium (git-fixes).\n- jffs2: fix use-after-free in jffs2_clear_xattr_subsystem (git-fixes).\n- jffs2: gc deadlock reading a page that is used in jffs2_write_begin() (git-fixes).\n- jffs2: reduce stack usage in jffs2_build_xattr_subsystem() (git-fixes).\n- jfs: jfs_dmap: validate db_l2nbperpage while mounting (git-fixes).\n- kabi fix after restore kabi for nvidia vgpu driver (bsc#1210825).\n- kabi/severities: add vas symbols changed due to recent fix vas accelerators are directly tied to the architecture, there is no reason to have out-of-tree production drivers\n- kabi/severities: ignore kabi of i915 module it's exported only for its sub-module, not really used by externals\n- kabi/severities: ignore kabi of vmwgfx the driver exports a function unnecessarily without used by anyone else. ignore the kabi changes.\n- kabi/severities: relax kabi for ath11k local symbols (bsc#1207948)\n- kabi: do not check external trampolines for signature (kabi bsc#1207894 bsc#1211243).\n- kernel-binary.spec.in: remove superfluous %% in supplements fixes: 02b7735e0caf ('rpm/kernel-binary.spec.in: add enhances and supplements tags to in-tree kmps')\n- kselftest: vdso: fix accumulation of uninitialized ret when clock_realtime is undefined (git-fixes).\n- kvm: arm64: do not read a hw interrupt pending state in user context (git-fixes)\n- kvm: arm64: warn if accessing timer pending state outside of vcpu (bsc#1213620)\n- kvm: do not null dereference ops->destroy (git-fixes)\n- kvm: downgrade two bug_ons to warn_on_once (git-fixes)\n- kvm: initialize debugfs_dentry when a vm is created to avoid null (git-fixes)\n- kvm: s390: pv: fix index value of replaced asce (git-fixes bsc#1213867).\n- kvm: vmx: inject #gp on encls if vcpu has paging disabled (cr0.pg==0) (git-fixes).\n- kvm: vmx: inject #gp, not #ud, if sgx2 encls leafs are unsupported (git-fixes).\n- kvm: vmx: restore vmx_vmexit alignment (git-fixes).\n- kvm: x86: account fastpath-only vm-exits in vcpu stats (git-fixes).\n- leds: trigger: netdev: recheck netdev_led_mode_linkup on dev rename (git-fixes).\n- libceph: harden msgr2.1 frame segment length checks (bsc#1213857).\n- m alsa: usb-audio: add quirk for tascam model 12 (git-fixes).\n- mailbox: ti-msgmgr: fill non-message tx data fields with 0x0 (git-fixes).\n- maintainers: add amd p-state driver maintainer entry (bsc#1212445).\n- md: add error_handlers for raid0 and linear (bsc#1212766).\n- media: atomisp: gmin_platform: fix out_len in gmin_get_config_dsm_var() (git-fixes).\n- media: cec: core: do not set last_initiator if tx in progress (git-fixes).\n- media: cec: i2c: ch7322: also select regmap (git-fixes).\n- media: i2c: correct format propagation for st-mipid02 (git-fixes).\n- media: staging: atomisp: select v4l2_fwnode (git-fixes).\n- media: usb: check az6007_read() return value (git-fixes).\n- media: usb: siano: fix warning due to null work_func_t function pointer (git-fixes).\n- media: venus: helpers: fix align() of non power of two (git-fixes).\n- media: videodev2.h: fix struct v4l2_input tuner index comment (git-fixes).\n- memcg: drop kmem.limit_in_bytes (bsc#1208788, bsc#1212905).\n- memory: brcmstb_dpfe: fix testing array offset after use (git-fixes).\n- meson saradc: fix clock divider mask length (git-fixes).\n- mfd: intel-lpss: add missing check for platform_get_resource (git-fixes).\n- mfd: pm8008: fix module autoloading (git-fixes).\n- mfd: rt5033: drop rt5033-battery sub-device (git-fixes).\n- mfd: stmfx: fix error path in stmfx_chip_init (git-fixes).\n- mfd: stmfx: nullify stmfx->vdd in case of error (git-fixes).\n- mfd: stmpe: only disable the regulators if they are enabled (git-fixes).\n- mhi_power_down() kabi workaround (bsc#1207948).\n- misc: fastrpc: create fastrpc scalar with correct buffer count (git-fixes).\n- misc: pci_endpoint_test: free irqs before removing the device (git-fixes).\n- misc: pci_endpoint_test: re-init completion for every test (git-fixes).\n- mmc: core: disable trim on kingston emmc04g-m627 (git-fixes).\n- mmc: mmci: set probe_prefer_asynchronous (git-fixes).\n- mmc: sdhci-msm: disable broken 64-bit dma on msm8916 (git-fixes).\n- mmc: sdhci: fix dma configure compatibility issue when 64bit dma mode is used (git-fixes).\n- mtd: rawnand: meson: fix unaligned dma buffers handling (git-fixes).\n- net/mlx5: add ifc bits for bypassing port select flow table (git-fixes)\n- net/mlx5: dr, support sw created encap actions for fw table (git-fixes).\n- net/mlx5e: check for not_ready flag state after locking (git-fixes).\n- net/mlx5e: fix double free in mlx5e_destroy_flow_table (git-fixes).\n- net/mlx5e: fix memory leak in mlx5e_fs_tt_redirect_any_create (git-fixes).\n- net/mlx5e: fix memory leak in mlx5e_ptp_open (git-fixes).\n- net/mlx5e: xdp, allow growing tail for xdp multi buffer (git-fixes).\n- net/mlx5e: xsk: set napi_id to support busy polling on xsk rq (git-fixes).\n- net/sched: sch_qfq: refactor parsing of netlink parameters (bsc#1213585).\n- net/sched: sch_qfq: reintroduce lmax bound check for mtu (bsc#1213585).\n- net: ena: fix shift-out-of-bounds in exponential backoff (git-fixes).\n- net: mana: add support for vlan tagging (bsc#1212301).\n- net: mana: batch ringing rx queue doorbell on receiving packets (bsc#1212901).\n- net: mana: use the correct wqe count for ringing rq doorbell (bsc#1212901).\n- net: phy: marvell10g: fix 88x3310 power up (git-fixes).\n- net: phy: prevent stale pointer dereference in phy_init() (git-fixes).\n- net: qrtr: fix an uninit variable access bug in qrtr_tx_resume() (git-fixes).\n- net: qrtr: start mhi channel after endpoit creation (git-fixes).\n- nfcsim.c: fix error checking for debugfs_create_dir (git-fixes).\n- nfsd: add encoding of op_recall flag for write delegation (git-fixes).\n- nfsd: fix double fget() bug in __write_ports_addfd() (git-fixes).\n- nfsd: fix sparse warning (git-fixes).\n- nfsd: remove open coding of string copy (git-fixes).\n- nfsv4.1: always send a reclaim_complete after establishing lease (git-fixes).\n- nfsv4.1: freeze the session table upon receiving nfs4err_badsession (git-fixes).\n- nilfs2: fix buffer corruption due to concurrent device reads (git-fixes).\n- nilfs2: reject devices with insufficient block count (git-fixes).\n- ntb: amd: fix error handling in amd_ntb_pci_driver_init() (git-fixes).\n- ntb: idt: fix error handling in idt_pci_driver_init() (git-fixes).\n- ntb: intel: fix error handling in intel_ntb_pci_driver_init() (git-fixes).\n- ntb: ntb_tool: add check for devm_kcalloc (git-fixes).\n- ntb: ntb_transport: fix possible memory leak while device_register() fails (git-fixes).\n- nvme-core: fix dev_pm_qos memleak (git-fixes).\n- nvme-core: fix memory leak in dhchap_ctrl_secret (git-fixes).\n- nvme-core: fix memory leak in dhchap_secret_store (git-fixes).\n- nvme-multipath: support io stats on the mpath device (bsc#1210565).\n- nvme-pci: add quirk for missing secondary temperature thresholds (git-fixes).\n- nvme-pci: fix dma direction of unmapping integrity data (git-fixes).\n- nvme-pci: remove nvme_queue from nvme_iod (git-fixes).\n- nvme: do not reject probe due to duplicate ids for single-ported pcie devices (git-fixes).\n- nvme: double ka polling frequency to avoid kato with tbkas on (git-fixes).\n- nvme: fix the nvme_id_ns_nvm_sts_mask definition (git-fixes).\n- nvme: introduce nvme_start_request (bsc#1210565).\n- ocfs2: check new file size on fallocate call (git-fixes).\n- ocfs2: fix defrag path triggering jbd2 assert (git-fixes).\n- ocfs2: fix freeing uninitialized resource on ocfs2_dlm_shutdown (git-fixes).\n- ocfs2: fix non-auto defrag path not working issue (git-fixes).\n- ocfs2: fix use-after-free when unmounting read-only filesystem (git-fixes).\n- ocfs2: switch to security_inode_init_security() (git-fixes).\n- octeontx-af: fix hardware timestamp configuration (git-fixes).\n- octeontx2-af: move validation of ptp pointer before its usage (git-fixes).\n- octeontx2-pf: add additional check for mcam rules (git-fixes).\n- opp: fix use-after-free in lazy_opp_tables after probe deferral (git-fixes).\n- pci/aspm: disable aspm on mfd function removal to avoid use-after-free (git-fixes).\n- pci/pm: avoid putting elopos e2/s2/h2 pcie ports in d3cold (git-fixes).\n- pci: add function 1 dma alias quirk for marvell 88se9235 (git-fixes).\n- pci: add pci_clear_master() stub for non-config_pci (git-fixes).\n- pci: cadence: fix gen2 link retraining process (git-fixes).\n- pci: endpoint: add missing documentation about the msi/msi-x range (git-fixes).\n- pci: ftpci100: release the clock resources (git-fixes).\n- pci: pciehp: cancel bringup sequence if card is not present (git-fixes).\n- pci: qcom: disable write access to read only registers for ip v2.3.3 (git-fixes).\n- pci: release resource invalidated by coalescing (git-fixes).\n- pci: rockchip: add poll and timeout to wait for phy plls to be locked (git-fixes).\n- pci: rockchip: assert pci configuration enable bit after probe (git-fixes).\n- pci: rockchip: fix legacy irq generation for rk3399 pcie endpoint core (git-fixes).\n- pci: rockchip: set address alignment for endpoint mode (git-fixes).\n- pci: rockchip: use u32 variable to access 32-bit registers (git-fixes).\n- pci: rockchip: write pci device id to correct register (git-fixes).\n- pci: s390: fix use-after-free of pci resources with per-function hotplug (bsc#1212525).\n- pci: vmd: fix uninitialized variable usage in vmd_enable_domain() (git-fixes).\n- pci: vmd: reset vmd config register between soft reboots (git-fixes).\n- perf/x86/amd/core: always clear status for idx (bsc#1213233).\n- phy: hisilicon: fix an out of bounds check in hisi_inno_phy_probe() (git-fixes).\n- phy: revert 'phy: remove soc_exynos4212 dep. from phy_exynos4x12_usb' (git-fixes).\n- phy: tegra: xusb: check return value of devm_kzalloc() (git-fixes).\n- phy: tegra: xusb: clear the driver reference in usb-phy dev (git-fixes).\n- pie: fix kernel-doc notation warning (git-fixes).\n- pinctrl: amd: detect internal gpio0 debounce handling (git-fixes).\n- pinctrl: amd: do not show `invalid config param` errors (git-fixes).\n- pinctrl: amd: fix mistake in handling clearing pins at startup (git-fixes).\n- pinctrl: amd: only use special debounce behavior for gpio 0 (git-fixes).\n- pinctrl: amd: use amd_pinconf_set() for all config options (git-fixes).\n- pinctrl: at91-pio4: check return value of devm_kasprintf() (git-fixes).\n- pinctrl: cherryview: return correct value if pin in push-pull mode (git-fixes).\n- pinctrl: microchip-sgpio: check return value of devm_kasprintf() (git-fixes).\n- platform/x86: msi-laptop: fix rfkill out-of-sync on msi wind u100 (git-fixes).\n- platform/x86: think-lmi: correct nvme password handling (git-fixes).\n- platform/x86: think-lmi: correct system password interface (git-fixes).\n- platform/x86: think-lmi: mutex protection around multiple wmi calls (git-fixes).\n- platform/x86: thinkpad_acpi: fix lkp-tests warnings for platform profiles (git-fixes).\n- powerpc/64: only warn if __pa()/__va() called with bad addresses (bsc#1194869).\n- powerpc/64s: fix vas mm use after free (bsc#1194869).\n- powerpc/book3s64/mm: fix directmap stats in /proc/meminfo (bsc#1194869).\n- powerpc/bpf: fix use of user_pt_regs in uapi (bsc#1194869).\n- powerpc/ftrace: remove ftrace init tramp once kernel init is complete (bsc#1194869).\n- powerpc/interrupt: do not read msr from interrupt_exit_kernel_prepare() (bsc#1194869).\n- powerpc/mm/dax: fix the condition when checking if altmap vmemap can cross-boundary (bsc#1150305 ltc#176097 git-fixes).\n- powerpc/mm: switch obsolete dssall to .long (bsc#1194869).\n- powerpc/powernv/sriov: perform null check on iov before dereferencing iov (bsc#1194869).\n- powerpc/powernv/vas: assign real address to rx_fifo in vas_rx_win_attr (bsc#1194869).\n- powerpc/prom_init: fix kernel config grep (bsc#1194869).\n- powerpc/pseries/vas: hold mmap_mutex after mmap lock during window close (jsc#ped-542 git-fixes).\n- powerpc/secvar: fix refcount leak in format_show() (bsc#1194869).\n- powerpc/xics: fix refcount leak in icp_opal_init() (bsc#1194869).\n- powerpc: clean vdso32 and vdso64 directories (bsc#1194869).\n- powerpc: define get_cycles macro for arch-override (bsc#1194869).\n- powerpc: update ppc_save_regs to save current r1 in pt_regs (bsc#1194869).\n- pstore/ram: add check for kstrdup (git-fixes).\n- pwm: ab8500: fix error code in probe() (git-fixes).\n- pwm: imx-tpm: force 'real_period' to be zero in suspend (git-fixes).\n- pwm: sysfs: do not apply state to already disabled pwms (git-fixes).\n- radeon: avoid double free in ci_dpm_init() (git-fixes).\n- rdma/bnxt_re: avoid calling wake_up threads from spin_lock context (git-fixes)\n- rdma/bnxt_re: disable/kill tasklet only if it is enabled (git-fixes)\n- rdma/bnxt_re: fix hang during driver unload (git-fixes)\n- rdma/bnxt_re: fix to remove an unnecessary log (git-fixes)\n- rdma/bnxt_re: fix to remove unnecessary return labels (git-fixes)\n- rdma/bnxt_re: prevent handling any completions after qp destroy (git-fixes)\n- rdma/bnxt_re: remove a redundant check inside bnxt_re_update_gid (git-fixes)\n- rdma/bnxt_re: remove unnecessary checks (git-fixes)\n- rdma/bnxt_re: return directly without goto jumps (git-fixes)\n- rdma/bnxt_re: use unique names while registering interrupts (git-fixes)\n- rdma/bnxt_re: wraparound mbox producer index (git-fixes)\n- rdma/cma: always set static rate to 0 for roce (git-fixes)\n- rdma/core: update cma destination address on rdma_resolve_addr (git-fixes)\n- rdma/hns: fix hns_roce_table_get return value (git-fixes)\n- rdma/irdma: add missing read barriers (git-fixes)\n- rdma/irdma: avoid fortify-string warning in irdma_clr_wqes (git-fixes)\n- rdma/irdma: fix data race on cqp completion stats (git-fixes)\n- rdma/irdma: fix data race on cqp request done (git-fixes)\n- rdma/irdma: fix op_type reporting in cqes (git-fixes)\n- rdma/irdma: report correct wc error (git-fixes)\n- rdma/mlx4: make check for invalid flags stricter (git-fixes)\n- rdma/mlx5: create an indirect flow table for steering anchor (git-fixes)\n- rdma/mlx5: do not set tx affinity when lag is in hash mode (git-fixes)\n- rdma/mlx5: fix affinity assignment (git-fixes)\n- rdma/mlx5: initiate dropless rq for raw ethernet functions (git-fixes)\n- rdma/mthca: fix crash when polling cq for shared qps (git-fixes)\n- rdma/rtrs: fix rxe_dealloc_pd warning (git-fixes)\n- rdma/rtrs: fix the last iu->buf leak in err path (git-fixes)\n- rdma/rxe: fix access checks in rxe_check_bind_mw (git-fixes)\n- rdma/rxe: fix packet length checks (git-fixes)\n- rdma/rxe: fix ref count error in check_rkey() (git-fixes)\n- rdma/rxe: fix rxe_cq_post (git-fixes)\n- rdma/rxe: fix the use-before-initialization error of resp_pkts (git-fixes)\n- rdma/rxe: remove dangling declaration of rxe_cq_disable() (git-fixes)\n- rdma/rxe: remove the unused variable obj (git-fixes)\n- rdma/rxe: removed unused name from rxe_task struct (git-fixes)\n- rdma/uverbs: restrict usage of privileged qkeys (git-fixes)\n- rdma/vmw_pvrdma: remove unnecessary check on wr->opcode (git-fixes)\n- regmap: account for register length in smbus i/o limits (git-fixes).\n- regmap: drop initial version of maximum transfer length fixes (git-fixes).\n- regulator: core: fix more error checking for debugfs_create_dir() (git-fixes).\n- regulator: core: streamline debugfs operations (git-fixes).\n- regulator: helper: document ramp_delay parameter of regulator_set_ramp_delay_regmap() (git-fixes).\n- restore kabi for nvidia vgpu driver (bsc#1210825).\n- revert 'alsa: usb-audio: drop superfluous interface setup at parsing' (git-fixes).\n- revert 'arm64: dts: zynqmp: add address-cells property to interrupt (git-fixes)\n- revert 'debugfs, coccinelle: check for obsolete define_simple_attribute() usage' (git-fixes).\n- revert 'drm/amd/display: edp do not add non-edid timings' (git-fixes).\n- revert 'drm/i915: disable dsb usage for now' (git-fixes).\n- revert 'drop amdgpu patches for fixing regression (bsc#1213304,bsc#1213777)' sle15-sp5 branch works as is, hence revive the dropped patches again.\n- revert 'iavf: detach device during reset task' (git-fixes).\n- revert 'iavf: do not restart tx queues after reset task failure' (git-fixes).\n- revert 'mtd: rawnand: arasan: prevent an unsupported configuration' (git-fixes).\n- revert 'net: phy: dp83867: perform soft reset and retain established link' (git-fixes).\n- revert 'nfsv4: retry lock on old_stateid during delegation return' (git-fixes).\n- revert 'usb: dwc3: core: enable autoretry feature in the controller' (git-fixes).\n- revert 'usb: gadget: tegra-xudc: fix error check in tegra_xudc_powerdomain_init()' (git-fixes).\n- revert 'usb: gadget: udc: core: offload usb_udc_vbus_handler processing'\n- revert 'usb: gadget: udc: core: prevent soft_connect_store() race'\n- revert 'usb: xhci: tegra: fix error check' (git-fixes).\n- revive drm_dp_mst_hpd_irq() function (bsc#1213578).\n- rpm/check-for-config-changes: ignore also pahole_has_* we now also have options like config_pahole_has_lang_exclude.\n- rpm/check-for-config-changes: ignore also riscv_isa_* and dynamic_sigframe they depend on config_toolchain_has_*.\n- rsi: remove kernel-doc comment marker (git-fixes).\n- rtc: efi: add wakeup support (bsc#1213116).\n- rtc: efi: enable set/get wakeup services as optional (bsc#1213116).\n- rtc: efi: switch to devm_rtc_allocate_device (bsc#1213116).\n- rtc: st-lpc: release some resources in st_rtc_probe() in case of error (git-fixes).\n- rxrpc, afs: fix selection of abort codes (git-fixes).\n- s390/ap: fix status returned by ap_aqic() (git-fixes bsc#1213259).\n- s390/ap: fix status returned by ap_qact() (git-fixes bsc#1213258).\n- s390/bpf: add expoline to tail calls (git-fixes bsc#1213870).\n- s390/dasd: fix hanging device after quiesce/resume (git-fixes bsc#1213810).\n- s390/dasd: print copy pair message only for the correct error (git-fixes bsc#1213872).\n- s390/debug: add _asm_s390_ prefix to header guard (git-fixes bsc#1213263).\n- s390/decompressor: specify __decompress() buf len to avoid overflow (git-fixes bsc#1213863).\n- s390/gmap: voluntarily schedule during key setting (git-fixes bsc#1212892).\n- s390/ipl: add missing intersection check to ipl_report handling (git-fixes bsc#1213871).\n- s390/pci: clean up left over special treatment for function zero (bsc#1212525).\n- s390/pci: only add specific device in zpci_bus_scan_device() (bsc#1212525).\n- s390/pci: remove redundant pci_bus_add_devices() on new bus (bsc#1212525).\n- s390/percpu: add read_once() to arch_this_cpu_to_op_simple() (git-fixes bsc#1213252).\n- s390/qeth: fix vipa deletion (git-fixes bsc#1213713).\n- s390/vmem: fix empty page tables cleanup under kasan (git-fixes bsc#1213715).\n- s390: define runtime_discard_exit to fix link error with gnu ld < 2.36 (git-fixes bsc#1213264).\n- s390: discard .interp section (git-fixes bsc#1213247).\n- s390: introduce nospec_uses_trampoline() (git-fixes bsc#1213870).\n- scftorture: count reschedule ipis (git-fixes).\n- sched/debug: fix dentry leak in update_sched_domain_debugfs (git-fixes)\n- sched: fix debug && !schedstats warn (git-fixes)\n- scsi: lpfc: abort outstanding els cmds when mailbox timeout error is detected (bsc#1213756).\n- scsi: lpfc: avoid -wstringop-overflow warning (bsc#1213756).\n- scsi: lpfc: clean up sli-4 sysfs resource reporting (bsc#1213756).\n- scsi: lpfc: copyright updates for 14.2.0.14 patches (bsc#1213756).\n- scsi: lpfc: fix a possible data race in lpfc_unregister_fcf_rescan() (bsc#1213756).\n- scsi: lpfc: fix incorrect big endian type assignment in bsg loopback path (bsc#1213756).\n- scsi: lpfc: fix incorrect big endian type assignments in fdmi and vmid paths (bsc#1213756).\n- scsi: lpfc: fix lpfc_name struct packing (bsc#1213756).\n- scsi: lpfc: make fabric zone discovery more robust when handling unsolicited logo (bsc#1213756).\n- scsi: lpfc: pull out fw diagnostic dump log message from driver's trace buffer (bsc#1213756).\n- scsi: lpfc: qualify ndlp discovery state when processing rscn (bsc#1213756).\n- scsi: lpfc: refactor cpu affinity assignment paths (bsc#1213756).\n- scsi: lpfc: remove extra ndlp kref decrement in flogi cmpl for loop topology (bsc#1213756).\n- scsi: lpfc: replace all non-returning strlcpy() with strscpy() (bsc#1213756).\n- scsi: lpfc: replace one-element array with flexible-array member (bsc#1213756).\n- scsi: lpfc: revise ndlp kref handling for dev_loss_tmo_callbk and lpfc_drop_node (bsc#1213756).\n- scsi: lpfc: set establish image pair service parameter only for target functions (bsc#1213756).\n- scsi: lpfc: simplify fcp_abort transport callback log message (bsc#1213756).\n- scsi: lpfc: update lpfc version to 14.2.0.14 (bsc#1213756).\n- scsi: lpfc: use struct_size() helper (bsc#1213756).\n- scsi: qla2xxx: adjust iocb resource on qpair create (bsc#1213747).\n- scsi: qla2xxx: array index may go out of bound (bsc#1213747).\n- scsi: qla2xxx: avoid fcport pointer dereference (bsc#1213747).\n- scsi: qla2xxx: check valid rport returned by fc_bsg_to_rport() (bsc#1213747).\n- scsi: qla2xxx: correct the index of array (bsc#1213747).\n- scsi: qla2xxx: drop useless list_head (bsc#1213747).\n- scsi: qla2xxx: fix buffer overrun (bsc#1213747).\n- scsi: qla2xxx: fix command flush during tmf (bsc#1213747).\n- scsi: qla2xxx: fix deletion race condition (bsc#1213747).\n- scsi: qla2xxx: fix end of loop test (bsc#1213747).\n- scsi: qla2xxx: fix erroneous link up failure (bsc#1213747).\n- scsi: qla2xxx: fix error code in qla2x00_start_sp() (bsc#1213747).\n- scsi: qla2xxx: fix inconsistent tmf timeout (bsc#1213747).\n- scsi: qla2xxx: fix null pointer dereference in target mode (bsc#1213747).\n- scsi: qla2xxx: fix potential null pointer dereference (bsc#1213747).\n- scsi: qla2xxx: fix session hang in gnl (bsc#1213747).\n- scsi: qla2xxx: fix tmf leak through (bsc#1213747).\n- scsi: qla2xxx: limit tmf to 8 per function (bsc#1213747).\n- scsi: qla2xxx: pointer may be dereferenced (bsc#1213747).\n- scsi: qla2xxx: remove unused nvme_ls_waitq wait queue (bsc#1213747).\n- scsi: qla2xxx: replace one-element array with declare_flex_array() helper (bsc#1213747).\n- scsi: qla2xxx: silence a static checker warning (bsc#1213747).\n- scsi: qla2xxx: turn off noisy message log (bsc#1213747).\n- scsi: qla2xxx: update version to 10.02.08.400-k (bsc#1213747).\n- scsi: qla2xxx: update version to 10.02.08.500-k (bsc#1213747).\n- scsi: qla2xxx: use vmalloc_array() and vcalloc() (bsc#1213747).\n- security: keys: modify mismatched function name (git-fixes).\n- selftests/ir: fix build with ancient kernel headers (git-fixes).\n- selftests: cgroup: fix unsigned comparison with less than zero (git-fixes).\n- selftests: forwarding: fix packet matching in mirroring selftests (git-fixes).\n- selftests: mptcp: depend on syn_cookies (git-fixes).\n- selftests: mptcp: sockopt: return error if wrong mark (git-fixes).\n- selftests: rtnetlink: remove netdevsim device after ipsec offload test (git-fixes).\n- selftests: tc: add 'ct' action kconfig dep (git-fixes).\n- selftests: tc: add conntrack procfs kconfig (git-fixes).\n- selftests: tc: set timeout to 15 minutes (git-fixes).\n- serial: 8250: lock port for stop_rx() in omap8250_irq() (git-fixes).\n- serial: 8250: lock port for uart_ier access in omap8250_irq() (git-fixes).\n- serial: 8250: omap: fix freeing of resources on failed register (git-fixes).\n- serial: 8250_omap: use force_suspend and resume for system suspend (git-fixes).\n- serial: atmel: do not enable irqs prematurely (git-fixes).\n- serial: qcom-geni: drop bogus runtime pm state update (git-fixes).\n- serial: sifive: fix sifive_serial_console_setup() section (git-fixes).\n- sfc: fix crash when reading stats while nic is resetting (git-fixes).\n- sfc: fix xdp queues mode with legacy irq (git-fixes).\n- sfc: use budget for tx completions (git-fixes).\n- signal/powerpc: on swapcontext failure force sigsegv (bsc#1194869).\n- signal/s390: use force_sigsegv in default_trap_handler (git-fixes bsc#1212861).\n- signal: replace force_sigsegv(sigsegv) with force_fatal_sig(sigsegv) (bsc#1194869).\n- smb3: do not reserve too many oplock credits (bsc#1193629).\n- smb3: missing null check in smb2_change_notify (bsc#1193629).\n- smb: client: fix broken file attrs with nodfs mounts (bsc#1193629).\n- smb: client: fix missed ses refcounting (git-fixes).\n- smb: client: fix parsing of source mount option (bsc#1193629).\n- smb: client: fix shared dfs root mounts with different prefixes (bsc#1193629).\n- smb: client: fix warning in cifs_match_super() (bsc#1193629).\n- smb: client: fix warning in cifs_smb3_do_mount() (bsc#1193629).\n- smb: client: fix warning in cifsfindfirst() (bsc#1193629).\n- smb: client: fix warning in cifsfindnext() (bsc#1193629).\n- smb: client: fix warning in generic_ip_connect() (bsc#1193629).\n- smb: client: improve dfs mount check (bsc#1193629).\n- smb: client: remove redundant pointer 'server' (bsc#1193629).\n- smb: delete an unnecessary statement (bsc#1193629).\n- smb: move client and server files to common directory fs/smb (bsc#1193629).\n- smb: remove obsolete comment (bsc#1193629).\n- soc/fsl/qe: fix usb.c build errors (git-fixes).\n- soc: samsung: exynos-pmu: re-introduce exynos4212 support (git-fixes).\n- soundwire: bus_type: avoid lockdep assert in sdw_drv_probe() (git-fixes).\n- soundwire: cadence: drain the rx fifo after an io timeout (git-fixes).\n- soundwire: dmi-quirks: add new mapping for hp spectre x360 (git-fixes).\n- soundwire: qcom: fix storing port config out-of-bounds (git-fixes).\n- soundwire: qcom: update status correctly with mask (git-fixes).\n- soundwire: stream: add missing clear of alloc_slave_rt (git-fixes).\n- spi: bcm-qspi: return error if neither hif_mspi nor mspi is available (git-fixes).\n- spi: bcm63xx: fix max prepend length (git-fixes).\n- spi: dw: round of n_bytes to power of 2 (git-fixes).\n- spi: lpspi: disable lpspi module irq in dma mode (git-fixes).\n- spi: spi-geni-qcom: correct cs_toggle bit in spi_trans_cfg (git-fixes).\n- staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() (git-fixes).\n- staging: r8712: fix memory leak in _r8712_init_xmit_priv() (git-fixes).\n- sunrpc: always free ctxt when freeing deferred request (git-fixes).\n- sunrpc: double free xprt_ctxt while still in use (git-fixes).\n- sunrpc: fix trace_svc_register() call site (git-fixes).\n- sunrpc: fix uaf in svc_tcp_listen_data_ready() (git-fixes).\n- sunrpc: remove dead code in svc_tcp_release_rqst() (git-fixes).\n- sunrpc: remove the maximum number of retries in call_bind_status (git-fixes).\n- svcrdma: prevent page release when nothing was received (git-fixes).\n- swsmu/amdgpu_smu: fix the wrong if-condition (git-fixes).\n- test_firmware: return enomem instead of enospc on failed memory allocation (git-fixes).\n- tpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation (git-fixes).\n- tpm_tis: explicitly check for error code (git-fixes).\n- tracing/timer: add missing hrtimer modes to decode_hrtimer_mode() (git-fixes).\n- tty: n_gsm: fix uaf in gsm_cleanup_mux (git-fixes).\n- tty: serial: fsl_lpuart: add earlycon for imx8ulp platform (git-fixes).\n- tty: serial: imx: fix rs485 rx after tx (git-fixes).\n- tty: serial: samsung_tty: fix a memory leak in s3c24xx_serial_getclk() in case of error (git-fixes).\n- tty: serial: samsung_tty: fix a memory leak in s3c24xx_serial_getclk() when iterating clk (git-fixes).\n- ubi: ensure that vid header offset + vid header size <= alloc, size (bsc#1210584).\n- ubi: fix failure attaching when vid_hdr offset equals to (sub)page size (bsc#1210584).\n- ubifs: add missing iput if do_tmpfile() failed in rename whiteout (git-fixes).\n- ubifs: do_rename: fix wrong space budget when target inode's nlink > 1 (git-fixes).\n- ubifs: error path in ubifs_remount_rw() seems to wrongly free write buffers (git-fixes).\n- ubifs: fix 'ui->dirty' race between do_tmpfile() and writeback work (git-fixes).\n- ubifs: fix aa deadlock when setting xattr for encrypted file (git-fixes).\n- ubifs: fix build errors as symbol undefined (git-fixes).\n- ubifs: fix deadlock in concurrent rename whiteout and inode writeback (git-fixes).\n- ubifs: fix memory leak in alloc_wbufs() (git-fixes).\n- ubifs: fix memory leak in do_rename (git-fixes).\n- ubifs: fix read out-of-bounds in ubifs_wbuf_write_nolock() (git-fixes).\n- ubifs: fix to add refcount once page is set private (git-fixes).\n- ubifs: fix wrong dirty space budget for dirty inode (git-fixes).\n- ubifs: free memory for tmpfile name (git-fixes).\n- ubifs: rectify space amount budget for mkdir/tmpfile operations (git-fixes).\n- ubifs: rectify space budget for ubifs_symlink() if symlink is encrypted (git-fixes).\n- ubifs: rectify space budget for ubifs_xrename() (git-fixes).\n- ubifs: rename whiteout atomically (git-fixes).\n- ubifs: rename_whiteout: correct old_dir size computing (git-fixes).\n- ubifs: rename_whiteout: fix double free for whiteout_ui->data (git-fixes).\n- ubifs: reserve one leb for each journal head while doing budget (git-fixes).\n- ubifs: setflags: make dirtied_ino_d 8 bytes aligned (git-fixes).\n- ubifs: ubifs_writepage: mark page dirty after writing inode failed (git-fixes).\n- udf: avoid double brelse() in udf_rename() (bsc#1213032).\n- udf: define efscorrupted error code (bsc#1213038).\n- udf: detect system inodes linked into directory hierarchy (bsc#1213114).\n- udf: discard preallocation before extending file with a hole (bsc#1213036).\n- udf: do not bother looking for prealloc extents if i_lenextents matches i_size (bsc#1213035).\n- udf: do not bother merging very long extents (bsc#1213040).\n- udf: do not update file length for failed writes to inline files (bsc#1213041).\n- udf: fix error handling in udf_new_inode() (bsc#1213112).\n- udf: fix extending file within last block (bsc#1213037).\n- udf: fix preallocation discarding at indirect extent boundary (bsc#1213034).\n- udf: preserve link count of system files (bsc#1213113).\n- udf: truncate added extents on failed expansion (bsc#1213039).\n- update config and supported.conf files due to renaming.\n- update config files: enable config_x86_amd_pstate (bsc#1212445)\n- update suse/rdma-mthca-fix-crash-when-polling-cq-for-shared-qps. (git-fixes bsc#1212604).\n- usb: dwc2: fix some error handling paths (git-fixes).\n- usb: dwc2: platform: improve error reporting for problems during .remove() (git-fixes).\n- usb: dwc3-meson-g12a: fix an error handling path in dwc3_meson_g12a_probe() (git-fixes).\n- usb: dwc3: do not reset device side if dwc3 was configured as host-only (git-fixes).\n- usb: dwc3: gadget: propagate core init errors to udc during pullup (git-fixes).\n- usb: dwc3: pci: skip byt gpio lookup table for hardwired phy (git-fixes).\n- usb: dwc3: qcom: fix an error handling path in dwc3_qcom_probe() (git-fixes).\n- usb: dwc3: qcom: fix potential memory leak (git-fixes).\n- usb: dwc3: qcom: release the correct resources in dwc3_qcom_remove() (git-fixes).\n- usb: gadget: core: remove unbalanced mutex_unlock in usb_gadget_activate (git-fixes).\n- usb: gadget: u_serial: add null pointer check in gserial_suspend (git-fixes).\n- usb: gadget: udc: core: offload usb_udc_vbus_handler processing (git-fixes).\n- usb: gadget: udc: core: prevent soft_connect_store() race (git-fixes).\n- usb: gadget: udc: fix null dereference in remove() (git-fixes).\n- usb: hide unused usbfs_notify_suspend/resume functions (git-fixes).\n- usb: phy: phy-tahvo: fix memory leak in tahvo_usb_probe() (git-fixes).\n- usb: serial: option: add lara-r6 01b pids (git-fixes).\n- usb: typec: fix fast_role_swap_current show function (git-fixes).\n- usb: typec: iterate pds array when showing the pd list (git-fixes).\n- usb: typec: set port->pd before adding device for typec_port (git-fixes).\n- usb: typec: use sysfs_emit_at when concatenating the string (git-fixes).\n- usb: xhci-mtk: set the dma max_seg_size (git-fixes).\n- usb: xhci: remove unused udev from xhci_log_ctx trace event (git-fixes).\n- usrmerge: adjust module path in the kernel sources (bsc#1212835).\n- vhost: support packed when setting-getting vring_base (git-fixes).\n- vhost_net: revert upend_idx only on retriable error (git-fixes).\n- virtio-net: maintain reverse cleanup order (git-fixes).\n- virtio_net: fix error unwinding of xdp initialization (git-fixes).\n- w1: fix loop in w1_fini() (git-fixes).\n- w1: w1_therm: fix locking behavior in convert_t (git-fixes).\n- wifi: airo: avoid uninitialized warning in airo_get_rate() (git-fixes).\n- wifi: ath10k: trigger sta disconnect after reconfig complete on hardware restart (git-fixes).\n- wifi: ath11k: add missing check for ioremap (git-fixes).\n- wifi: ath11k: add support for suspend in power down state (bsc#1207948).\n- wifi: ath11k: handle irq enable/disable in several code path (bsc#1207948).\n- wifi: ath11k: handle thermal device registeration together with mac (bsc#1207948).\n- wifi: ath11k: remove mhi loopback channels (bsc#1207948).\n- wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx (git-fixes).\n- wifi: ath9k: convert msecs to jiffies where needed (git-fixes).\n- wifi: ath9k: do not allow to overwrite endpoint0 attributes (git-fixes).\n- wifi: ath9k: fix ar9003 mac hardware hang check register offset calculation (git-fixes).\n- wifi: ath9k: fix possible stall on ath9k_txq_list_has_key() (git-fixes).\n- wifi: atmel: fix an error handling path in atmel_probe() (git-fixes).\n- wifi: cfg80211: rewrite merging of inherited elements (git-fixes).\n- wifi: iwlwifi: mvm: indicate hw decrypt for beacon protection (git-fixes).\n- wifi: iwlwifi: pcie: fix null pointer dereference in iwl_pcie_irq_rx_msix_handler() (git-fixes).\n- wifi: iwlwifi: pull from txqs with softirqs disabled (git-fixes).\n- wifi: mwifiex: fix the size of a memory allocation in mwifiex_ret_802_11_scan() (git-fixes).\n- wifi: orinoco: fix an error handling path in orinoco_cs_probe() (git-fixes).\n- wifi: orinoco: fix an error handling path in spectrum_cs_probe() (git-fixes).\n- wifi: ray_cs: drop useless status variable in parse_addr() (git-fixes).\n- wifi: ray_cs: utilize strnlen() in parse_addr() (git-fixes).\n- wifi: rsi: do not configure wowlan in shutdown hook if not enabled (git-fixes).\n- wifi: rsi: do not set mmc_pm_keep_power in shutdown (git-fixes).\n- wifi: rtw89: debug: fix error code in rtw89_debug_priv_send_h2c_set() (git-fixes).\n- wifi: wilc1000: fix for absent rsn capabilities wfa testcase (git-fixes).\n- wl3501_cs: use eth_hw_addr_set() (git-fixes).\n- writeback: fix call of incorrect macro (bsc#1213024).\n- writeback: fix dereferencing null mapping->host on writeback_page_template (git-fixes).\n- x86/amd_nb: add pci id for family 19h model 78h (git-fixes).\n- x86/build: avoid relocation information in final vmlinux (bsc#1187829).\n- x86/kprobes: fix arch_check_optimized_kprobe check within optimized_kprobe range (git-fixes).\n- x86/platform/uv: add platform resolving #defines for misc gam_mmioh_redirect* (bsc#1212256 jsc#ped-4718).\n- x86/platform/uv: fix printed information in calc_mmioh_map (bsc#1212256 jsc#ped-4718).\n- x86/platform/uv: helper functions for allocating and freeing conversion tables (bsc#1212256 jsc#ped-4718).\n- x86/platform/uv: introduce helper function uv_pnode_to_socket (bsc#1212256 jsc#ped-4718).\n- x86/platform/uv: remove remaining bug_on() and bug() calls (bsc#1212256 jsc#ped-4718).\n- x86/platform/uv: update uv platform code for snc (bsc#1212256 jsc#ped-4718).\n- x86/platform/uv: uv support for sub-numa clustering (bsc#1212256 jsc#ped-4718).\n- x86/platform/uv: when searching for minimums, start at int_max not 99999 (bsc#1212256 jsc#ped-4718).\n- x86/pvh: obtain vga console info in dom0 (git-fixes).\n- x86/xen: fix secondary processor fpu initialization (bsc#1212869).\n- x86: fix .brk attribute in linker script (git-fixes).\n- xen/blkfront: only check req_fua for writes (git-fixes).\n- xen/pvcalls-back: fix double frees with pvcalls_new_active_socket() (git-fixes).\n- xfs: ail needs asynchronous cil forcing (bsc#1211811).\n- xfs: async cil flushes need pending pushes to be made stable (bsc#1211811).\n- xfs: attach iclog callbacks in xlog_cil_set_ctx_write_state() (bsc#1211811).\n- xfs: cil work is serialised, not pipelined (bsc#1211811).\n- xfs: clean up the rtbitmap fsmap backend (git-fixes).\n- xfs: do not deplete the reserve pool when trying to shrink the fs (git-fixes).\n- xfs: do not reverse order of items in bulk ail insertion (git-fixes).\n- xfs: do not run shutdown callbacks on active iclogs (bsc#1211811).\n- xfs: drop async cache flushes from cil commits (bsc#1211811).\n- xfs: factor out log write ordering from xlog_cil_push_work() (bsc#1211811).\n- xfs: fix getfsmap reporting past the last rt extent (git-fixes).\n- xfs: fix integer overflows in the fsmap rtbitmap and logdev backends (git-fixes).\n- xfs: fix interval filtering in multi-step fsmap queries (git-fixes).\n- xfs: fix logdev fsmap query result filtering (git-fixes).\n- xfs: fix off-by-one error when the last rt extent is in use (git-fixes).\n- xfs: fix uninitialized variable access (git-fixes).\n- xfs: make fsmap backend function key parameters const (git-fixes).\n- xfs: make the record pointer passed to query_range functions const (git-fixes).\n- xfs: move the cil workqueue to the cil (bsc#1211811).\n- xfs: move xlog_commit_record to xfs_log_cil.c (bsc#1211811).\n- xfs: order cil checkpoint start records (bsc#1211811).\n- xfs: pass a cil context to xlog_write() (bsc#1211811).\n- xfs: pass explicit mount pointer to rtalloc query functions (git-fixes).\n- xfs: rework xlog_state_do_callback() (bsc#1211811).\n- xfs: run callbacks before waking waiters in xlog_state_shutdown_callbacks (bsc#1211811).\n- xfs: separate out log shutdown callback processing (bsc#1211811).\n- xfs: wait iclog complete before tearing down ail (bsc#1211811).\n- xfs: xlog_state_ioerror must die (bsc#1211811).\n- xhci: fix resume issue of some zhaoxin hosts (git-fixes).\n- xhci: fix trb prefetch issue of zhaoxin hosts (git-fixes).\n- xhci: show zhaoxin xhci root hub speed correctly (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-3302,SUSE-SLE-Module-Live-Patching-15-SP5-2023-3302,SUSE-SLE-Module-RT-15-SP5-2023-3302,openSUSE-SLE-15.5-2023-3302", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3302-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:3302-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20233302-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:3302-1", url: "https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html", }, { category: "self", summary: "SUSE Bug 1150305", url: "https://bugzilla.suse.com/1150305", }, { category: "self", summary: "SUSE Bug 1187829", url: "https://bugzilla.suse.com/1187829", }, { category: "self", summary: "SUSE Bug 1193629", url: "https://bugzilla.suse.com/1193629", }, { category: "self", summary: "SUSE Bug 1194869", url: "https://bugzilla.suse.com/1194869", }, { category: "self", summary: "SUSE Bug 1206418", url: "https://bugzilla.suse.com/1206418", }, { category: "self", summary: "SUSE Bug 1207129", url: "https://bugzilla.suse.com/1207129", }, { category: "self", summary: "SUSE Bug 1207894", url: "https://bugzilla.suse.com/1207894", }, { category: "self", summary: "SUSE Bug 1207948", url: "https://bugzilla.suse.com/1207948", }, { category: "self", summary: "SUSE Bug 1208788", url: "https://bugzilla.suse.com/1208788", }, { category: "self", summary: "SUSE Bug 1210335", url: "https://bugzilla.suse.com/1210335", }, { category: "self", summary: "SUSE Bug 1210565", url: "https://bugzilla.suse.com/1210565", }, { category: "self", summary: "SUSE Bug 1210584", url: "https://bugzilla.suse.com/1210584", }, { category: "self", summary: "SUSE Bug 1210627", url: "https://bugzilla.suse.com/1210627", }, { category: "self", summary: "SUSE Bug 1210780", url: "https://bugzilla.suse.com/1210780", }, { category: "self", summary: "SUSE Bug 1210825", url: "https://bugzilla.suse.com/1210825", }, { category: "self", summary: "SUSE Bug 1210853", url: "https://bugzilla.suse.com/1210853", }, { category: "self", summary: "SUSE Bug 1211014", url: "https://bugzilla.suse.com/1211014", }, { category: "self", summary: "SUSE Bug 1211131", url: "https://bugzilla.suse.com/1211131", }, { category: "self", summary: "SUSE Bug 1211243", url: "https://bugzilla.suse.com/1211243", }, { category: "self", summary: "SUSE Bug 1211738", url: "https://bugzilla.suse.com/1211738", }, { category: "self", summary: "SUSE Bug 1211811", url: "https://bugzilla.suse.com/1211811", }, { category: "self", summary: "SUSE Bug 1211867", url: "https://bugzilla.suse.com/1211867", }, { category: "self", summary: "SUSE Bug 1212051", url: "https://bugzilla.suse.com/1212051", }, { category: "self", summary: "SUSE Bug 1212256", url: "https://bugzilla.suse.com/1212256", }, { category: "self", summary: "SUSE Bug 1212265", url: "https://bugzilla.suse.com/1212265", }, { category: "self", summary: "SUSE Bug 1212301", url: "https://bugzilla.suse.com/1212301", }, { category: "self", summary: "SUSE Bug 1212445", url: "https://bugzilla.suse.com/1212445", }, { category: "self", summary: "SUSE Bug 1212456", url: "https://bugzilla.suse.com/1212456", }, { category: "self", summary: "SUSE Bug 1212502", url: "https://bugzilla.suse.com/1212502", }, { category: "self", summary: "SUSE Bug 1212525", url: "https://bugzilla.suse.com/1212525", }, { category: "self", summary: "SUSE Bug 1212603", url: "https://bugzilla.suse.com/1212603", }, { category: "self", summary: "SUSE Bug 1212604", url: "https://bugzilla.suse.com/1212604", }, { category: "self", summary: "SUSE Bug 1212685", url: "https://bugzilla.suse.com/1212685", }, { category: "self", summary: "SUSE Bug 1212766", url: "https://bugzilla.suse.com/1212766", }, { category: "self", summary: "SUSE Bug 1212835", url: "https://bugzilla.suse.com/1212835", }, { category: "self", summary: "SUSE Bug 1212838", url: "https://bugzilla.suse.com/1212838", }, { category: "self", summary: "SUSE Bug 1212842", url: "https://bugzilla.suse.com/1212842", }, { category: "self", summary: "SUSE Bug 1212846", url: "https://bugzilla.suse.com/1212846", }, { category: "self", summary: "SUSE Bug 1212848", url: "https://bugzilla.suse.com/1212848", }, { category: "self", summary: "SUSE Bug 1212861", url: "https://bugzilla.suse.com/1212861", }, { category: "self", summary: "SUSE Bug 1212869", url: "https://bugzilla.suse.com/1212869", }, { category: "self", summary: "SUSE Bug 1212892", url: "https://bugzilla.suse.com/1212892", }, { category: "self", summary: "SUSE Bug 1212901", url: "https://bugzilla.suse.com/1212901", }, { category: "self", summary: "SUSE Bug 1212905", url: "https://bugzilla.suse.com/1212905", }, { category: "self", summary: "SUSE Bug 1212961", url: "https://bugzilla.suse.com/1212961", }, { category: "self", summary: "SUSE Bug 1213010", url: "https://bugzilla.suse.com/1213010", }, { category: "self", summary: "SUSE Bug 1213011", url: "https://bugzilla.suse.com/1213011", }, { category: "self", summary: "SUSE Bug 1213012", url: "https://bugzilla.suse.com/1213012", }, { category: "self", summary: "SUSE Bug 1213013", url: "https://bugzilla.suse.com/1213013", }, { category: "self", summary: "SUSE Bug 1213014", url: "https://bugzilla.suse.com/1213014", }, { category: "self", summary: "SUSE Bug 1213015", url: "https://bugzilla.suse.com/1213015", }, { category: "self", summary: "SUSE Bug 1213016", url: "https://bugzilla.suse.com/1213016", }, { category: "self", summary: "SUSE Bug 1213017", url: "https://bugzilla.suse.com/1213017", }, { category: "self", summary: "SUSE Bug 1213018", url: "https://bugzilla.suse.com/1213018", }, { category: "self", summary: "SUSE Bug 1213019", url: "https://bugzilla.suse.com/1213019", }, { category: "self", summary: "SUSE Bug 1213020", url: "https://bugzilla.suse.com/1213020", }, { category: "self", summary: "SUSE Bug 1213021", url: "https://bugzilla.suse.com/1213021", }, { category: "self", summary: "SUSE Bug 1213024", url: "https://bugzilla.suse.com/1213024", }, { category: "self", summary: "SUSE Bug 1213025", url: "https://bugzilla.suse.com/1213025", }, { category: "self", summary: "SUSE Bug 1213032", url: "https://bugzilla.suse.com/1213032", }, { category: "self", summary: "SUSE Bug 1213034", url: "https://bugzilla.suse.com/1213034", }, { category: "self", summary: "SUSE Bug 1213035", url: "https://bugzilla.suse.com/1213035", }, { category: "self", summary: "SUSE Bug 1213036", url: "https://bugzilla.suse.com/1213036", }, { category: "self", summary: "SUSE Bug 1213037", url: "https://bugzilla.suse.com/1213037", }, { category: "self", summary: "SUSE Bug 1213038", url: "https://bugzilla.suse.com/1213038", }, { category: "self", summary: "SUSE Bug 1213039", url: "https://bugzilla.suse.com/1213039", }, { category: "self", summary: "SUSE Bug 1213040", url: "https://bugzilla.suse.com/1213040", }, { category: "self", summary: "SUSE Bug 1213041", url: "https://bugzilla.suse.com/1213041", }, { category: "self", summary: "SUSE Bug 1213059", url: "https://bugzilla.suse.com/1213059", }, { category: "self", summary: "SUSE Bug 1213061", url: "https://bugzilla.suse.com/1213061", }, { category: "self", summary: "SUSE Bug 1213087", url: "https://bugzilla.suse.com/1213087", }, { category: "self", summary: "SUSE Bug 1213088", url: "https://bugzilla.suse.com/1213088", }, { category: "self", summary: "SUSE Bug 1213089", url: "https://bugzilla.suse.com/1213089", }, { category: "self", summary: "SUSE Bug 1213090", url: "https://bugzilla.suse.com/1213090", }, { category: "self", summary: "SUSE Bug 1213092", url: "https://bugzilla.suse.com/1213092", }, { category: "self", summary: "SUSE Bug 1213093", url: "https://bugzilla.suse.com/1213093", }, { category: "self", summary: "SUSE Bug 1213094", url: "https://bugzilla.suse.com/1213094", }, { category: "self", summary: "SUSE Bug 1213095", url: "https://bugzilla.suse.com/1213095", }, { category: "self", summary: "SUSE Bug 1213096", url: "https://bugzilla.suse.com/1213096", }, { category: "self", summary: "SUSE Bug 1213098", url: "https://bugzilla.suse.com/1213098", }, { category: "self", summary: "SUSE Bug 1213099", url: "https://bugzilla.suse.com/1213099", }, { category: "self", summary: "SUSE Bug 1213100", url: "https://bugzilla.suse.com/1213100", }, { category: "self", summary: "SUSE Bug 1213102", url: "https://bugzilla.suse.com/1213102", }, { category: "self", summary: "SUSE Bug 1213103", url: "https://bugzilla.suse.com/1213103", }, { category: "self", summary: "SUSE Bug 1213104", url: "https://bugzilla.suse.com/1213104", }, { category: "self", summary: "SUSE Bug 1213105", url: "https://bugzilla.suse.com/1213105", }, { category: "self", summary: "SUSE Bug 1213106", url: "https://bugzilla.suse.com/1213106", }, { category: "self", summary: "SUSE Bug 1213107", url: "https://bugzilla.suse.com/1213107", }, { category: "self", summary: "SUSE Bug 1213108", url: "https://bugzilla.suse.com/1213108", }, { category: "self", summary: "SUSE Bug 1213109", url: "https://bugzilla.suse.com/1213109", }, { category: "self", summary: "SUSE Bug 1213110", url: "https://bugzilla.suse.com/1213110", }, { category: "self", summary: "SUSE Bug 1213111", url: "https://bugzilla.suse.com/1213111", }, { category: "self", summary: "SUSE Bug 1213112", url: "https://bugzilla.suse.com/1213112", }, { category: "self", summary: "SUSE Bug 1213113", url: "https://bugzilla.suse.com/1213113", }, { category: "self", summary: "SUSE Bug 1213114", url: "https://bugzilla.suse.com/1213114", }, { category: "self", summary: "SUSE Bug 1213116", url: "https://bugzilla.suse.com/1213116", }, { category: "self", summary: "SUSE Bug 1213134", url: "https://bugzilla.suse.com/1213134", }, { category: "self", summary: "SUSE Bug 1213167", url: "https://bugzilla.suse.com/1213167", }, { category: "self", summary: "SUSE Bug 1213205", url: "https://bugzilla.suse.com/1213205", }, { category: "self", summary: "SUSE Bug 1213206", url: "https://bugzilla.suse.com/1213206", }, { category: "self", summary: "SUSE Bug 1213226", url: "https://bugzilla.suse.com/1213226", }, { category: "self", summary: "SUSE Bug 1213233", url: "https://bugzilla.suse.com/1213233", }, { category: "self", summary: "SUSE Bug 1213245", url: "https://bugzilla.suse.com/1213245", }, { category: "self", summary: "SUSE Bug 1213247", url: "https://bugzilla.suse.com/1213247", }, { category: "self", summary: "SUSE Bug 1213252", url: "https://bugzilla.suse.com/1213252", }, { category: "self", summary: "SUSE Bug 1213258", url: "https://bugzilla.suse.com/1213258", }, { category: "self", summary: "SUSE Bug 1213259", url: "https://bugzilla.suse.com/1213259", }, { category: "self", summary: "SUSE Bug 1213263", url: "https://bugzilla.suse.com/1213263", }, { category: "self", summary: "SUSE Bug 1213264", url: "https://bugzilla.suse.com/1213264", }, { category: "self", summary: "SUSE Bug 1213272", url: "https://bugzilla.suse.com/1213272", }, { category: "self", summary: "SUSE Bug 1213286", url: "https://bugzilla.suse.com/1213286", }, { category: "self", summary: "SUSE Bug 1213287", url: "https://bugzilla.suse.com/1213287", }, { category: "self", summary: "SUSE Bug 1213304", url: "https://bugzilla.suse.com/1213304", }, { category: "self", summary: "SUSE Bug 1213417", url: "https://bugzilla.suse.com/1213417", }, { category: "self", summary: "SUSE Bug 1213493", url: "https://bugzilla.suse.com/1213493", }, { category: "self", summary: "SUSE Bug 1213523", url: "https://bugzilla.suse.com/1213523", }, { category: "self", summary: "SUSE Bug 1213524", url: "https://bugzilla.suse.com/1213524", }, { category: "self", summary: "SUSE Bug 1213533", url: "https://bugzilla.suse.com/1213533", }, { category: "self", summary: "SUSE Bug 1213543", url: "https://bugzilla.suse.com/1213543", }, { category: "self", summary: "SUSE Bug 1213578", url: "https://bugzilla.suse.com/1213578", }, { category: "self", summary: "SUSE Bug 1213585", url: "https://bugzilla.suse.com/1213585", }, { category: "self", summary: "SUSE Bug 1213586", url: "https://bugzilla.suse.com/1213586", }, { category: "self", summary: "SUSE Bug 1213588", url: "https://bugzilla.suse.com/1213588", }, { category: "self", summary: "SUSE Bug 1213601", url: "https://bugzilla.suse.com/1213601", }, { category: "self", summary: "SUSE Bug 1213620", url: "https://bugzilla.suse.com/1213620", }, { category: "self", summary: "SUSE Bug 1213632", url: "https://bugzilla.suse.com/1213632", }, { category: "self", summary: "SUSE Bug 1213653", url: "https://bugzilla.suse.com/1213653", }, { category: "self", summary: "SUSE Bug 1213705", url: "https://bugzilla.suse.com/1213705", }, { category: "self", summary: "SUSE Bug 1213713", url: "https://bugzilla.suse.com/1213713", }, { category: "self", summary: "SUSE Bug 1213715", url: "https://bugzilla.suse.com/1213715", }, { category: "self", summary: "SUSE Bug 1213747", url: "https://bugzilla.suse.com/1213747", }, { category: "self", summary: "SUSE Bug 1213756", url: "https://bugzilla.suse.com/1213756", }, { category: "self", summary: "SUSE Bug 1213759", url: "https://bugzilla.suse.com/1213759", }, { category: "self", summary: "SUSE Bug 1213777", url: "https://bugzilla.suse.com/1213777", }, { category: "self", summary: "SUSE Bug 1213810", url: "https://bugzilla.suse.com/1213810", }, { category: "self", summary: "SUSE Bug 1213812", url: "https://bugzilla.suse.com/1213812", }, { category: "self", summary: "SUSE Bug 1213856", url: "https://bugzilla.suse.com/1213856", }, { category: "self", summary: "SUSE Bug 1213857", url: "https://bugzilla.suse.com/1213857", }, { category: "self", summary: "SUSE Bug 1213863", url: "https://bugzilla.suse.com/1213863", }, { category: "self", summary: "SUSE Bug 1213867", url: "https://bugzilla.suse.com/1213867", }, { category: "self", summary: "SUSE Bug 1213870", url: "https://bugzilla.suse.com/1213870", }, { category: "self", summary: "SUSE Bug 1213871", url: "https://bugzilla.suse.com/1213871", }, { category: "self", summary: "SUSE Bug 1213872", url: "https://bugzilla.suse.com/1213872", }, { category: "self", summary: "SUSE CVE CVE-2022-40982 page", url: "https://www.suse.com/security/cve/CVE-2022-40982/", }, { category: "self", summary: "SUSE CVE CVE-2023-0459 page", url: "https://www.suse.com/security/cve/CVE-2023-0459/", }, { category: "self", summary: "SUSE CVE CVE-2023-1829 page", url: "https://www.suse.com/security/cve/CVE-2023-1829/", }, { category: "self", summary: "SUSE CVE CVE-2023-20569 page", url: "https://www.suse.com/security/cve/CVE-2023-20569/", }, { category: "self", summary: "SUSE CVE CVE-2023-20593 page", url: "https://www.suse.com/security/cve/CVE-2023-20593/", }, { category: "self", summary: "SUSE CVE CVE-2023-21400 page", url: "https://www.suse.com/security/cve/CVE-2023-21400/", }, { category: "self", summary: "SUSE CVE CVE-2023-2156 page", url: "https://www.suse.com/security/cve/CVE-2023-2156/", }, { category: "self", summary: "SUSE CVE CVE-2023-2166 page", url: "https://www.suse.com/security/cve/CVE-2023-2166/", }, { category: "self", summary: "SUSE CVE CVE-2023-2430 page", url: "https://www.suse.com/security/cve/CVE-2023-2430/", }, { category: "self", summary: "SUSE CVE CVE-2023-2985 page", url: "https://www.suse.com/security/cve/CVE-2023-2985/", }, { category: "self", summary: "SUSE CVE CVE-2023-3090 page", url: "https://www.suse.com/security/cve/CVE-2023-3090/", }, { category: "self", summary: "SUSE CVE CVE-2023-31083 page", url: "https://www.suse.com/security/cve/CVE-2023-31083/", }, { category: "self", summary: "SUSE CVE CVE-2023-3111 page", url: "https://www.suse.com/security/cve/CVE-2023-3111/", }, { category: "self", summary: "SUSE CVE CVE-2023-3117 page", url: "https://www.suse.com/security/cve/CVE-2023-3117/", }, { category: "self", summary: "SUSE CVE CVE-2023-31248 page", url: "https://www.suse.com/security/cve/CVE-2023-31248/", }, { category: "self", summary: "SUSE CVE CVE-2023-3212 page", url: "https://www.suse.com/security/cve/CVE-2023-3212/", }, { category: "self", summary: "SUSE CVE CVE-2023-3268 page", url: "https://www.suse.com/security/cve/CVE-2023-3268/", }, { category: "self", summary: "SUSE CVE CVE-2023-3389 page", url: "https://www.suse.com/security/cve/CVE-2023-3389/", }, { category: "self", summary: "SUSE CVE CVE-2023-3390 page", url: "https://www.suse.com/security/cve/CVE-2023-3390/", }, { category: "self", summary: "SUSE CVE CVE-2023-35001 page", url: "https://www.suse.com/security/cve/CVE-2023-35001/", }, { category: "self", summary: "SUSE CVE CVE-2023-3567 page", url: "https://www.suse.com/security/cve/CVE-2023-3567/", }, { category: "self", summary: "SUSE CVE CVE-2023-3609 page", url: "https://www.suse.com/security/cve/CVE-2023-3609/", }, { category: "self", summary: "SUSE CVE CVE-2023-3611 page", url: "https://www.suse.com/security/cve/CVE-2023-3611/", }, { category: "self", summary: "SUSE CVE CVE-2023-3776 page", url: "https://www.suse.com/security/cve/CVE-2023-3776/", }, { category: "self", summary: "SUSE CVE CVE-2023-3812 page", url: "https://www.suse.com/security/cve/CVE-2023-3812/", }, { category: "self", summary: "SUSE CVE CVE-2023-38409 page", url: "https://www.suse.com/security/cve/CVE-2023-38409/", }, { category: "self", summary: "SUSE CVE CVE-2023-3863 page", url: "https://www.suse.com/security/cve/CVE-2023-3863/", }, { category: "self", summary: "SUSE CVE CVE-2023-4004 page", url: "https://www.suse.com/security/cve/CVE-2023-4004/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-08-14T07:44:11Z", generator: { date: "2023-08-14T07:44:11Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:3302-1", initial_release_date: "2023-08-14T07:44:11Z", revision_history: [ { date: "2023-08-14T07:44:11Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-5.14.21-150500.13.11.1.noarch", product: { name: "kernel-devel-rt-5.14.21-150500.13.11.1.noarch", product_id: "kernel-devel-rt-5.14.21-150500.13.11.1.noarch", }, }, { category: "product_version", name: "kernel-source-rt-5.14.21-150500.13.11.1.noarch", product: { name: "kernel-source-rt-5.14.21-150500.13.11.1.noarch", product_id: "kernel-source-rt-5.14.21-150500.13.11.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", product: { name: "cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", product_id: "cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", product: { name: "dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", product_id: "dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", product: { name: "gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", product_id: "gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", product: { name: "kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", product_id: "kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-5.14.21-150500.13.11.1.x86_64", product: { name: "kernel-rt-5.14.21-150500.13.11.1.x86_64", product_id: "kernel-rt-5.14.21-150500.13.11.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", product: { name: "kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", product_id: "kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", product: { name: "kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", product_id: "kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", product: { name: "kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", product_id: "kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", product: { name: "kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", product_id: "kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", product: { name: "kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", product_id: "kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", product: { name: "kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", product_id: "kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", product: { name: "kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", product_id: "kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", product: { name: "kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", product_id: "kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", product: { name: "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", product_id: "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", product: { name: "kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", product_id: "kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", product: { name: "kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", product_id: "kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", product: { name: "kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", product_id: "kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", product: { name: "ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", product_id: "ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", product: { name: "reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", product_id: "reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP5", product: { name: "SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp5", }, }, }, { category: "product_name", name: "SUSE Real Time Module 15 SP5", product: { name: "SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-rt:15:sp5", }, }, }, { category: "product_name", name: "openSUSE Leap 15.5", product: { name: "openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", }, product_reference: "kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", }, product_reference: "cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", }, product_reference: "dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", }, product_reference: "gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-5.14.21-150500.13.11.1.noarch as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", }, product_reference: "kernel-devel-rt-5.14.21-150500.13.11.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150500.13.11.1.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-5.14.21-150500.13.11.1.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", }, product_reference: "kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", }, product_reference: "kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-5.14.21-150500.13.11.1.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", }, product_reference: "kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", }, product_reference: "kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", }, product_reference: "kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.14.21-150500.13.11.1.noarch as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", }, product_reference: "kernel-source-rt-5.14.21-150500.13.11.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-5.14.21-150500.13.11.1.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", }, product_reference: "kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64 as component of SUSE Real Time Module 15 SP5", product_id: "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", }, product_reference: "ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", }, product_reference: "cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", }, product_reference: "dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", }, product_reference: "gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-5.14.21-150500.13.11.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", }, product_reference: "kernel-devel-rt-5.14.21-150500.13.11.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150500.13.11.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-5.14.21-150500.13.11.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", }, product_reference: "kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-extra-5.14.21-150500.13.11.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", }, product_reference: "kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", }, product_reference: "kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", }, product_reference: "kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-optional-5.14.21-150500.13.11.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", }, product_reference: "kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", }, product_reference: "kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-5.14.21-150500.13.11.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", }, product_reference: "kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", }, product_reference: "kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", }, product_reference: "kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", }, product_reference: "kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.14.21-150500.13.11.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", }, product_reference: "kernel-source-rt-5.14.21-150500.13.11.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-5.14.21-150500.13.11.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", }, product_reference: "kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", }, product_reference: "kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", }, product_reference: "ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", }, product_reference: "reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, ], }, vulnerabilities: [ { cve: "CVE-2022-40982", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-40982", }, ], notes: [ { category: "general", text: "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-40982", url: "https://www.suse.com/security/cve/CVE-2022-40982", }, { category: "external", summary: "SUSE Bug 1206418 for CVE-2022-40982", url: "https://bugzilla.suse.com/1206418", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2022-40982", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "moderate", }, ], title: "CVE-2022-40982", }, { cve: "CVE-2023-0459", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-0459", }, ], notes: [ { category: "general", text: "Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the \"access_ok\" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-0459", url: "https://www.suse.com/security/cve/CVE-2023-0459", }, { category: "external", summary: "SUSE Bug 1211738 for CVE-2023-0459", url: "https://bugzilla.suse.com/1211738", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-0459", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "moderate", }, ], title: "CVE-2023-0459", }, { cve: "CVE-2023-1829", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-1829", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root.\nWe recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-1829", url: "https://www.suse.com/security/cve/CVE-2023-1829", }, { category: "external", summary: "SUSE Bug 1210335 for CVE-2023-1829", url: "https://bugzilla.suse.com/1210335", }, { category: "external", summary: "SUSE Bug 1210619 for CVE-2023-1829", url: "https://bugzilla.suse.com/1210619", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-1829", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-1829", url: "https://bugzilla.suse.com/1217531", }, { category: "external", summary: "SUSE Bug 1220886 for CVE-2023-1829", url: "https://bugzilla.suse.com/1220886", }, { category: "external", summary: "SUSE Bug 1228311 for CVE-2023-1829", url: "https://bugzilla.suse.com/1228311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "important", }, ], title: "CVE-2023-1829", }, { cve: "CVE-2023-20569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-20569", }, ], notes: [ { category: "general", text: "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-20569", url: "https://www.suse.com/security/cve/CVE-2023-20569", }, { category: "external", summary: "SUSE Bug 1213287 for CVE-2023-20569", url: "https://bugzilla.suse.com/1213287", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "moderate", }, ], title: "CVE-2023-20569", }, { cve: "CVE-2023-20593", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-20593", }, ], notes: [ { category: "general", text: "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-20593", url: "https://www.suse.com/security/cve/CVE-2023-20593", }, { category: "external", summary: "SUSE Bug 1213286 for CVE-2023-20593", url: "https://bugzilla.suse.com/1213286", }, { category: "external", summary: "SUSE Bug 1213616 for CVE-2023-20593", url: "https://bugzilla.suse.com/1213616", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-20593", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "moderate", }, ], title: "CVE-2023-20593", }, { cve: "CVE-2023-21400", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-21400", }, ], notes: [ { category: "general", text: "In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-21400", url: "https://www.suse.com/security/cve/CVE-2023-21400", }, { category: "external", summary: "SUSE Bug 1213272 for CVE-2023-21400", url: "https://bugzilla.suse.com/1213272", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "moderate", }, ], title: "CVE-2023-21400", }, { cve: "CVE-2023-2156", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2156", }, ], notes: [ { category: "general", text: "A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2156", url: "https://www.suse.com/security/cve/CVE-2023-2156", }, { category: "external", summary: "SUSE Bug 1211131 for CVE-2023-2156", url: "https://bugzilla.suse.com/1211131", }, { category: "external", summary: "SUSE Bug 1211395 for CVE-2023-2156", url: "https://bugzilla.suse.com/1211395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "important", }, ], title: "CVE-2023-2156", }, { cve: "CVE-2023-2166", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2166", }, ], notes: [ { category: "general", text: "A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2166", url: "https://www.suse.com/security/cve/CVE-2023-2166", }, { category: "external", summary: "SUSE Bug 1210627 for CVE-2023-2166", url: "https://bugzilla.suse.com/1210627", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "moderate", }, ], title: "CVE-2023-2166", }, { cve: "CVE-2023-2430", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2430", }, ], notes: [ { category: "general", text: "A vulnerability was found due to missing lock for IOPOLL flaw in io_cqring_event_overflow() in io_uring.c in Linux Kernel. This flaw allows a local attacker with user privilege to trigger a Denial of Service threat.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2430", url: "https://www.suse.com/security/cve/CVE-2023-2430", }, { category: "external", summary: "SUSE Bug 1211014 for CVE-2023-2430", url: "https://bugzilla.suse.com/1211014", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "moderate", }, ], title: "CVE-2023-2430", }, { cve: "CVE-2023-2985", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2985", }, ], notes: [ { category: "general", text: "A use after free flaw was found in hfsplus_put_super in fs/hfsplus/super.c in the Linux Kernel. This flaw could allow a local user to cause a denial of service problem.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2985", url: "https://www.suse.com/security/cve/CVE-2023-2985", }, { category: "external", summary: "SUSE Bug 1211867 for CVE-2023-2985", url: "https://bugzilla.suse.com/1211867", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "moderate", }, ], title: "CVE-2023-2985", }, { cve: "CVE-2023-3090", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3090", }, ], notes: [ { category: "general", text: "A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation.\n\nThe out-of-bounds write is caused by missing skb->cb initialization in the ipvlan network driver. The vulnerability is reachable if CONFIG_IPVLAN is enabled.\n\n\nWe recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3090", url: "https://www.suse.com/security/cve/CVE-2023-3090", }, { category: "external", summary: "SUSE Bug 1212842 for CVE-2023-3090", url: "https://bugzilla.suse.com/1212842", }, { category: "external", summary: "SUSE Bug 1212849 for CVE-2023-3090", url: "https://bugzilla.suse.com/1212849", }, { category: "external", summary: "SUSE Bug 1214128 for CVE-2023-3090", url: "https://bugzilla.suse.com/1214128", }, { category: "external", summary: "SUSE Bug 1219701 for CVE-2023-3090", url: "https://bugzilla.suse.com/1219701", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "important", }, ], title: "CVE-2023-3090", }, { cve: "CVE-2023-31083", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-31083", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu->proto is set. A NULL pointer dereference may occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-31083", url: "https://www.suse.com/security/cve/CVE-2023-31083", }, { category: "external", summary: "SUSE Bug 1210780 for CVE-2023-31083", url: "https://bugzilla.suse.com/1210780", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "moderate", }, ], title: "CVE-2023-31083", }, { cve: "CVE-2023-3111", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3111", }, ], notes: [ { category: "general", text: "A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance() before calling btrfs_ioctl_defrag().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3111", url: "https://www.suse.com/security/cve/CVE-2023-3111", }, { category: "external", summary: "SUSE Bug 1212051 for CVE-2023-3111", url: "https://bugzilla.suse.com/1212051", }, { category: "external", summary: "SUSE Bug 1220015 for CVE-2023-3111", url: "https://bugzilla.suse.com/1220015", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "moderate", }, ], title: "CVE-2023-3111", }, { cve: "CVE-2023-3117", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3117", }, ], notes: [ { category: "general", text: "** REJECT ** Duplicate of CVE-2023-3390.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3117", url: "https://www.suse.com/security/cve/CVE-2023-3117", }, { category: "external", summary: "SUSE Bug 1212934 for CVE-2023-3117", url: "https://bugzilla.suse.com/1212934", }, { category: "external", summary: "SUSE Bug 1213245 for CVE-2023-3117", url: "https://bugzilla.suse.com/1213245", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "important", }, ], title: "CVE-2023-3117", }, { cve: "CVE-2023-31248", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-31248", }, ], notes: [ { category: "general", text: "Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-31248", url: "https://www.suse.com/security/cve/CVE-2023-31248", }, { category: "external", summary: "SUSE Bug 1213061 for CVE-2023-31248", url: "https://bugzilla.suse.com/1213061", }, { category: "external", summary: "SUSE Bug 1213064 for CVE-2023-31248", url: "https://bugzilla.suse.com/1213064", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "important", }, ], title: "CVE-2023-31248", }, { cve: "CVE-2023-3212", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3212", }, ], notes: [ { category: "general", text: "A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3212", url: "https://www.suse.com/security/cve/CVE-2023-3212", }, { category: "external", summary: "SUSE Bug 1212265 for CVE-2023-3212", url: "https://bugzilla.suse.com/1212265", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "moderate", }, ], title: "CVE-2023-3212", }, { cve: "CVE-2023-3268", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3268", }, ], notes: [ { category: "general", text: "An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3268", url: "https://www.suse.com/security/cve/CVE-2023-3268", }, { category: "external", summary: "SUSE Bug 1212502 for CVE-2023-3268", url: "https://bugzilla.suse.com/1212502", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-3268", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "moderate", }, ], title: "CVE-2023-3268", }, { cve: "CVE-2023-3389", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3389", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation.\n\nRacing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer.\n\nWe recommend upgrading past commit ef7dfac51d8ed961b742218f526bd589f3900a59 (4716c73b188566865bdd79c3a6709696a224ac04 for 5.10 stable and 0e388fce7aec40992eadee654193cad345d62663 for 5.15 stable).\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3389", url: "https://www.suse.com/security/cve/CVE-2023-3389", }, { category: "external", summary: "SUSE Bug 1212838 for CVE-2023-3389", url: "https://bugzilla.suse.com/1212838", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "moderate", }, ], title: "CVE-2023-3389", }, { cve: "CVE-2023-3390", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3390", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c.\n\nMishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.\n\nWe recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3390", url: "https://www.suse.com/security/cve/CVE-2023-3390", }, { category: "external", summary: "SUSE Bug 1212846 for CVE-2023-3390", url: "https://bugzilla.suse.com/1212846", }, { category: "external", summary: "SUSE Bug 1212934 for CVE-2023-3390", url: "https://bugzilla.suse.com/1212934", }, { category: "external", summary: "SUSE Bug 1216225 for CVE-2023-3390", url: "https://bugzilla.suse.com/1216225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "important", }, ], title: "CVE-2023-3390", }, { cve: "CVE-2023-35001", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-35001", }, ], notes: [ { category: "general", text: "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-35001", url: "https://www.suse.com/security/cve/CVE-2023-35001", }, { category: "external", summary: "SUSE Bug 1213059 for CVE-2023-35001", url: "https://bugzilla.suse.com/1213059", }, { category: "external", summary: "SUSE Bug 1213063 for CVE-2023-35001", url: "https://bugzilla.suse.com/1213063", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-35001", url: "https://bugzilla.suse.com/1217531", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "important", }, ], title: "CVE-2023-35001", }, { cve: "CVE-2023-3567", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3567", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3567", url: "https://www.suse.com/security/cve/CVE-2023-3567", }, { category: "external", summary: "SUSE Bug 1213167 for CVE-2023-3567", url: "https://bugzilla.suse.com/1213167", }, { category: "external", summary: "SUSE Bug 1213244 for CVE-2023-3567", url: "https://bugzilla.suse.com/1213244", }, { category: "external", summary: "SUSE Bug 1213842 for CVE-2023-3567", url: "https://bugzilla.suse.com/1213842", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-3567", url: "https://bugzilla.suse.com/1215674", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3567", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3567", url: "https://bugzilla.suse.com/1217531", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "important", }, ], title: "CVE-2023-3567", }, { cve: "CVE-2023-3609", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3609", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3609", url: "https://www.suse.com/security/cve/CVE-2023-3609", }, { category: "external", summary: "SUSE Bug 1213586 for CVE-2023-3609", url: "https://bugzilla.suse.com/1213586", }, { category: "external", summary: "SUSE Bug 1213587 for CVE-2023-3609", url: "https://bugzilla.suse.com/1213587", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3609", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3609", url: "https://bugzilla.suse.com/1217531", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "moderate", }, ], title: "CVE-2023-3609", }, { cve: "CVE-2023-3611", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3611", }, ], notes: [ { category: "general", text: "An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.\n\nWe recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3611", url: "https://www.suse.com/security/cve/CVE-2023-3611", }, { category: "external", summary: "SUSE Bug 1213585 for CVE-2023-3611", url: "https://bugzilla.suse.com/1213585", }, { category: "external", summary: "SUSE Bug 1223091 for CVE-2023-3611", url: "https://bugzilla.suse.com/1223091", }, { category: "external", summary: "SUSE Bug 1223973 for CVE-2023-3611", url: "https://bugzilla.suse.com/1223973", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "moderate", }, ], title: "CVE-2023-3611", }, { cve: "CVE-2023-3776", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3776", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3776", url: "https://www.suse.com/security/cve/CVE-2023-3776", }, { category: "external", summary: "SUSE Bug 1213588 for CVE-2023-3776", url: "https://bugzilla.suse.com/1213588", }, { category: "external", summary: "SUSE Bug 1215119 for CVE-2023-3776", url: "https://bugzilla.suse.com/1215119", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-3776", url: "https://bugzilla.suse.com/1215674", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3776", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3776", url: "https://bugzilla.suse.com/1217531", }, { category: "external", summary: "SUSE Bug 1221578 for CVE-2023-3776", url: "https://bugzilla.suse.com/1221578", }, { category: "external", summary: "SUSE Bug 1221598 for CVE-2023-3776", url: "https://bugzilla.suse.com/1221598", }, { category: "external", summary: "SUSE Bug 1223091 for CVE-2023-3776", url: "https://bugzilla.suse.com/1223091", }, { category: "external", summary: "SUSE Bug 1223973 for CVE-2023-3776", url: "https://bugzilla.suse.com/1223973", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "moderate", }, ], title: "CVE-2023-3776", }, { cve: "CVE-2023-3812", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3812", }, ], notes: [ { category: "general", text: "An out-of-bounds memory access flaw was found in the Linux kernel's TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3812", url: "https://www.suse.com/security/cve/CVE-2023-3812", }, { category: "external", summary: "SUSE Bug 1213543 for CVE-2023-3812", url: "https://bugzilla.suse.com/1213543", }, { category: "external", summary: "SUSE Bug 1213706 for CVE-2023-3812", url: "https://bugzilla.suse.com/1213706", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3812", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3812", url: "https://bugzilla.suse.com/1217531", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "important", }, ], title: "CVE-2023-3812", }, { cve: "CVE-2023-38409", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-38409", }, ], notes: [ { category: "general", text: "An issue was discovered in set_con2fb_map in drivers/video/fbdev/core/fbcon.c in the Linux kernel before 6.2.12. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-38409", url: "https://www.suse.com/security/cve/CVE-2023-38409", }, { category: "external", summary: "SUSE Bug 1213417 for CVE-2023-38409", url: "https://bugzilla.suse.com/1213417", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "low", }, ], title: "CVE-2023-38409", }, { cve: "CVE-2023-3863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3863", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC in the Linux kernel. This flaw allows a local user with special privileges to impact a kernel information leak issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3863", url: "https://www.suse.com/security/cve/CVE-2023-3863", }, { category: "external", summary: "SUSE Bug 1213601 for CVE-2023-3863", url: "https://bugzilla.suse.com/1213601", }, { category: "external", summary: "SUSE Bug 1213603 for CVE-2023-3863", url: "https://bugzilla.suse.com/1213603", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3863", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3863", url: "https://bugzilla.suse.com/1217531", }, { category: "external", summary: "SUSE Bug 1219704 for CVE-2023-3863", url: "https://bugzilla.suse.com/1219704", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "moderate", }, ], title: "CVE-2023-3863", }, { cve: "CVE-2023-4004", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4004", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4004", url: "https://www.suse.com/security/cve/CVE-2023-4004", }, { category: "external", summary: "SUSE Bug 1213812 for CVE-2023-4004", url: "https://bugzilla.suse.com/1213812", }, { category: "external", summary: "SUSE Bug 1214812 for CVE-2023-4004", url: "https://bugzilla.suse.com/1214812", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_11-rt-1-150500.11.5.1.x86_64", "SUSE Real Time Module 15 SP5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "SUSE Real Time Module 15 SP5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "SUSE Real Time Module 15 SP5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-devel-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-extra-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-optional-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-rt_debug-vdso-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kernel-source-rt-5.14.21-150500.13.11.1.noarch", "openSUSE Leap 15.5:kernel-syms-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-rt-5.14.21-150500.13.11.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-rt-5.14.21-150500.13.11.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T07:44:11Z", details: "important", }, ], title: "CVE-2023-4004", }, ], }
suse-su-2023:3318-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-40982: Fixed transient execution attack called 'Gather Data Sampling' (bsc#1206418).\n- CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec (bsc#1211738).\n- CVE-2023-20569: Fixed side channel attack ‘Inception’ or ‘RAS Poisoning’ (bsc#1213287).\n- CVE-2023-20593: Fixed a ZenBleed issue in 'Zen 2' CPUs that could allow an attacker to potentially access sensitive information (bsc#1213286).\n- CVE-2023-21400: Fixed several memory corruptions due to improper locking in io_uring (bsc#1213272).\n- CVE-2023-2156: Fixed a flaw in the networking subsystem within the handling of the RPL protocol (bsc#1211131).\n- CVE-2023-2166: Fixed NULL pointer dereference in can_rcv_filter (bsc#1210627).\n- CVE-2023-2985: Fixed an use-after-free vulnerability in hfsplus_put_super in fs/hfsplus/super.c that could allow a local user to cause a denial of service (bsc#1211867).\n- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).\n- CVE-2023-3117: Fixed an use-after-free vulnerability in the netfilter subsystem when processing named and anonymous sets in batch requests that could allow a local user with CAP_NET_ADMIN capability to crash or potentially escalate their privileges on the system (bsc#1213245).\n- CVE-2023-31248: Fixed an use-after-free vulnerability in nft_chain_lookup_byid that could allow a local attacker to escalate their privilege (bsc#1213061).\n- CVE-2023-3268: Fixed an out of bounds memory access flaw in relay_file_read_start_pos in the relayfs (bsc#1212502).\n- CVE-2023-3390: Fixed an use-after-free vulnerability in the netfilter subsystem in net/netfilter/nf_tables_api.c that could allow a local attacker with user access to cause a privilege escalation issue (bsc#1212846).\n- CVE-2023-35001: Fixed an out-of-bounds memory access flaw in nft_byteorder that could allow a local attacker to escalate their privilege (bsc#1213059).\n- CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c (bsc#1213167).\n- CVE-2023-3609: Fixed reference counter leak leading to overflow in net/sched (bsc#1213586).\n- CVE-2023-3611: Fixed an out-of-bounds write in net/sched sch_qfq(bsc#1213585).\n- CVE-2023-3776: Fixed improper refcount update in cls_fw leads to use-after-free (bsc#1213588).\n- CVE-2023-3812: Fixed an out-of-bounds memory access flaw in the TUN/TAP device driver functionality that could allow a local user to crash or potentially escalate their privileges on the system (bsc#1213543).\n- CVE-2023-4004: Fixed improper element removal netfilter nft_set_pipapo (bsc#1213812).\n\nThe following non-security bugs were fixed:\n\n- acpi: utils: fix acpi_evaluate_dsm_typed() redefinition error (git-fixes).\n- add module_firmware() for firmware_tg357766 (git-fixes).\n- afs: adjust ack interpretation to try and cope with nat (git-fixes).\n- afs: fix access after dec in put functions (git-fixes).\n- afs: fix afs_getattr() to refetch file status if callback break occurred (git-fixes).\n- afs: fix dynamic root getattr (git-fixes).\n- afs: fix fileserver probe rtt handling (git-fixes).\n- afs: fix infinite loop found by xfstest generic/676 (git-fixes).\n- afs: fix lost servers_outstanding count (git-fixes).\n- afs: fix server->active leak in afs_put_server (git-fixes).\n- afs: fix setting of mtime when creating a file/dir/symlink (git-fixes).\n- afs: fix updating of i_size with dv jump from server (git-fixes).\n- afs: fix vlserver probe rtt handling (git-fixes).\n- afs: return -eagain, not -eremoteio, when a file already locked (git-fixes).\n- afs: use refcount_t rather than atomic_t (git-fixes).\n- afs: use the operation issue time instead of the reply time for callbacks (git-fixes).\n- alsa: emu10k1: roll up loops in dsp setup code for audigy (git-fixes).\n- alsa: fireface: make read-only const array for model names static (git-fixes).\n- alsa: hda/realtek - remove 3k pull low procedure (git-fixes).\n- alsa: hda/realtek: add quirk for asus rog g614jx (git-fixes).\n- alsa: hda/realtek: add quirk for asus rog ga402x (git-fixes).\n- alsa: hda/realtek: add quirk for asus rog gx650p (git-fixes).\n- alsa: hda/realtek: add quirk for asus rog gz301v (git-fixes).\n- alsa: hda/realtek: add quirk for clevo npx0snx (git-fixes).\n- alsa: hda/realtek: add quirk for clevo ns70au (git-fixes).\n- alsa: hda/realtek: add quirks for unis h3c desktop b760 & q760 (git-fixes).\n- alsa: hda/realtek: add support for dell oasis 13/14/16 laptops (git-fixes).\n- alsa: hda/realtek: amend g634 quirk to enable rear speakers (git-fixes).\n- alsa: hda/realtek: enable mute led on hp laptop 15s-eq2xxx (git-fixes).\n- alsa: hda/realtek: fix generic fixup definition for cs35l41 amp (git-fixes).\n- alsa: hda/realtek: support asus g713pv laptop (git-fixes).\n- alsa: hda/realtek: whitespace fix (git-fixes).\n- alsa: hda/relatek: enable mute led on hp 250 g8 (git-fixes).\n- alsa: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() (git-fixes).\n- alsa: oxfw: make read-only const array models static (git-fixes).\n- alsa: pcm: fix potential data race at pcm memory allocation helpers (git-fixes).\n- alsa: usb-audio: add quirk for microsoft modern wireless headset (bsc#1207129).\n- alsa: usb-audio: update for native dsd support quirks (git-fixes).\n- apparmor: fix missing error check for rhashtable_insert_fast (git-fixes).\n- arm64/mm: mark private vm_fault_x defines as vm_fault_t (git-fixes)\n- arm64: dts: microchip: sparx5: do not use psci on reference boards (git-fixes)\n- arm64: vdso: pass (void *) to virt_to_page() (git-fixes)\n- arm64: xor-neon: mark xor_arm64_neon_*() static (git-fixes)\n- asoc: atmel: fix the 8k sample parameter in i2sc master (git-fixes).\n- asoc: codecs: es8316: fix dmic config (git-fixes).\n- asoc: codecs: wcd-mbhc-v2: fix resource leaks on component remove (git-fixes).\n- asoc: codecs: wcd934x: fix resource leaks on component remove (git-fixes).\n- asoc: codecs: wcd938x: fix codec initialisation race (git-fixes).\n- asoc: codecs: wcd938x: fix db range for hphl and hphr (git-fixes).\n- asoc: codecs: wcd938x: fix missing clsh ctrl error handling (git-fixes).\n- asoc: codecs: wcd938x: fix soundwire initialisation race (git-fixes).\n- asoc: da7219: check for failure reading aad irq events (git-fixes).\n- asoc: da7219: flush pending aad irq when suspending (git-fixes).\n- asoc: fsl_sai: disable bit clock with transmitter (git-fixes).\n- asoc: fsl_spdif: silence output on stop (git-fixes).\n- asoc: rt5682-sdw: fix for jd event handling in clockstop mode0 (git-fixes).\n- asoc: rt711-sdca: fix for jd event handling in clockstop mode0 (git-fixes).\n- asoc: rt711: fix for jd event handling in clockstop mode0 (git-fixes).\n- asoc: tegra: fix adx byte map (git-fixes).\n- asoc: tegra: fix amx byte map (git-fixes).\n- asoc: wm8904: fill the cache for wm8904_adc_test_0 register (git-fixes).\n- ata: pata_ns87415: mark ns87560_tf_read static (git-fixes).\n- block, bfq: fix division by zero error on zero wsum (bsc#1213653).\n- block: fix a source code comment in include/uapi/linux/blkzoned.h (git-fixes).\n- can: bcm: fix uaf in bcm_proc_show() (git-fixes).\n- can: gs_usb: gs_can_close(): add missing set of can state to can_state_stopped (git-fixes).\n- ceph: do not let check_caps skip sending responses for revoke msgs (bsc#1213856).\n- cifs: add a warning when the in-flight count goes negative (bsc#1193629).\n- cifs: address unused variable warning (bsc#1193629).\n- cifs: do all necessary checks for credits within or before locking (bsc#1193629).\n- cifs: fix lease break oops in xfstest generic/098 (bsc#1193629).\n- cifs: fix max_credits implementation (bsc#1193629).\n- cifs: fix session state check in reconnect to avoid use-after-free issue (bsc#1193629).\n- cifs: fix session state check in smb2_find_smb_ses (bsc#1193629).\n- cifs: fix session state transition to avoid use-after-free issue (bsc#1193629).\n- cifs: fix sockaddr comparison in iface_cmp (bsc#1193629).\n- cifs: fix status checks in cifs_tree_connect (bsc#1193629).\n- cifs: log session id when a matching ses is not found (bsc#1193629).\n- cifs: new dynamic tracepoint to track ses not found errors (bsc#1193629).\n- cifs: prevent use-after-free by freeing the cfile later (bsc#1193629).\n- cifs: print all credit counters in debugdata (bsc#1193629).\n- cifs: print client_guid in debugdata (bsc#1193629).\n- cifs: print more detail when invalidate_inode_mapping fails (bsc#1193629).\n- cifs: print nosharesock value while dumping mount options (bsc#1193629).\n- clk: qcom: camcc-sc7180: add parent dependency to all camera gdscs (git-fixes).\n- clk: qcom: gcc-ipq6018: use floor ops for sdcc clocks (git-fixes).\n- coda: avoid partial allocation of sig_inputargs (git-fixes).\n- codel: fix kernel-doc notation warnings (git-fixes).\n- crypto: kpp - add helper to set reqsize (git-fixes).\n- crypto: qat - use helper to set reqsize (git-fixes).\n- delete suse/memcg-drop-kmem-limit_in_bytes. drop the patch in order to fix bsc#1213705.\n- devlink: fix kernel-doc notation warnings (git-fixes).\n- dlm: fix missing lkb refcount handling (git-fixes).\n- dlm: fix plock invalid read (git-fixes).\n- docs: networking: update codeaurora references for rmnet (git-fixes).\n- documentation: abi: sysfs-class-net-qmi: pass_through contact update (git-fixes).\n- documentation: bonding: fix the doc of peer_notif_delay (git-fixes).\n- documentation: devices.txt: reconcile serial/ucc_uart minor numers (git-fixes).\n- documentation: timers: hrtimers: make hybrid union historical (git-fixes).\n- drm/amd/display: correct `dmub_fw_version` macro (git-fixes).\n- drm/amd/display: disable mpc split by default on special asic (git-fixes).\n- drm/amd/display: keep phy active for dp displays on dcn31 (git-fixes).\n- drm/amdgpu: avoid restore process run into dead loop (git-fixes).\n- drm/amdgpu: fix clearing mappings for bos that are always valid in vm (git-fixes).\n- drm/amdgpu: set vmbo destroy after pt bo is created (git-fixes).\n- drm/amdgpu: validate vm ioctl flags (git-fixes).\n- drm/atomic: allow vblank-enabled + self-refresh 'disable' (git-fixes).\n- drm/atomic: fix potential use-after-free in nonblocking commits (git-fixes).\n- drm/bridge: tc358768: add atomic_get_input_bus_fmts() implementation (git-fixes).\n- drm/bridge: tc358768: fix tclk_trailcnt computation (git-fixes).\n- drm/bridge: tc358768: fix ths_trailcnt computation (git-fixes).\n- drm/bridge: tc358768: fix ths_zerocnt computation (git-fixes).\n- drm/client: fix memory leak in drm_client_modeset_probe (git-fixes).\n- drm/client: fix memory leak in drm_client_target_cloned (git-fixes).\n- drm/i915/psr: use hw.adjusted mode when calculating io/fast wake times (git-fixes).\n- drm/i915: fix one wrong caching mode enum usage (git-fixes).\n- drm/msm/adreno: fix snapshot bindless_data size (git-fixes).\n- drm/msm/disp/dpu: get timing engine status from intf status register (git-fixes).\n- drm/msm/dpu: drop enum dpu_core_perf_data_bus_id (git-fixes).\n- drm/msm/dpu: set dpu_data_hctl_en for in intf_sc7180_mask (git-fixes).\n- drm/msm: fix is_err_or_null() vs null check in a5xx_submit_in_rb() (git-fixes).\n- drm/panel: simple: add connector_type for innolux_at043tn24 (git-fixes).\n- drm/panel: simple: add powertip ph800480t013 drm_display_mode flags (git-fixes).\n- drm/radeon: fix integer overflow in radeon_cs_parser_init (git-fixes).\n- drm/ttm: do not leak a resource on swapout move error (git-fixes).\n- drop amdgpu patches for fixing regression (bsc#1213304,bsc#1213777)\n- dt-bindings: phy: brcm,brcmstb-usb-phy: fix error in 'compatible' conditional schema (git-fixes).\n- enable nxp snvs rtc driver for i.mx 8mq/8mp (jsc#PED-4758)\n- ext4: add ea_inode checking to ext4_iget() (bsc#1213106).\n- ext4: add ext4_sb_block_valid() refactored out of ext4_inode_block_valid() (bsc#1213088).\n- ext4: add lockdep annotations for i_data_sem for ea_inode's (bsc#1213109).\n- ext4: add strict range checks while freeing blocks (bsc#1213089).\n- ext4: avoid deadlock in fs reclaim with page writeback (bsc#1213016).\n- ext4: bail out of ext4_xattr_ibody_get() fails for any reason (bsc#1213018).\n- ext4: block range must be validated before use in ext4_mb_clear_bb() (bsc#1213090).\n- ext4: check iomap type only if ext4_iomap_begin() does not fail (bsc#1213103).\n- ext4: disallow ea_inodes with extended attributes (bsc#1213108).\n- ext4: fail ext4_iget if special inode unallocated (bsc#1213010).\n- ext4: fix bug_on in __es_tree_search caused by bad quota inode (bsc#1213111).\n- ext4: fix data races when using cached status extents (bsc#1213102).\n- ext4: fix deadlock when converting an inline directory in nojournal mode (bsc#1213105).\n- ext4: fix i_disksize exceeding i_size problem in paritally written case (bsc#1213015).\n- ext4: fix lockdep warning when enabling mmp (bsc#1213100).\n- ext4: fix reusing stale buffer heads from last failed mounting (bsc#1213020).\n- ext4: fix task hung in ext4_xattr_delete_inode (bsc#1213096).\n- ext4: fix to check return value of freeze_bdev() in ext4_shutdown() (bsc#1213021).\n- ext4: fix use-after-free read in ext4_find_extent for bigalloc + inline (bsc#1213098).\n- ext4: fix warning in ext4_update_inline_data (bsc#1213012).\n- ext4: fix warning in mb_find_extent (bsc#1213099).\n- ext4: improve error handling from ext4_dirhash() (bsc#1213104).\n- ext4: improve error recovery code paths in __ext4_remount() (bsc#1213017).\n- ext4: move where set the may_inline_data flag is set (bsc#1213011).\n- ext4: only update i_reserved_data_blocks on successful block allocation (bsc#1213019).\n- ext4: refactor ext4_free_blocks() to pull out ext4_mb_clear_bb() (bsc#1213087).\n- ext4: refuse to create ea block when umounted (bsc#1213093).\n- ext4: set lockdep subclass for the ea_inode in ext4_xattr_inode_cache_find() (bsc#1213107).\n- ext4: turn quotas off if mount failed after enabling quotas (bsc#1213110).\n- ext4: update s_journal_inum if it changes after journal replay (bsc#1213094).\n- ext4: use ext4_fc_tl_mem in fast-commit replay path (bsc#1213092).\n- ext4: zero i_disksize when initializing the bootloader inode (bsc#1213013).\n- fbdev: au1200fb: fix missing irq check in au1200fb_drv_probe (git-fixes).\n- fbdev: imxfb: warn about invalid left/right margin (git-fixes).\n- file: always lock position for fmode_atomic_pos (bsc#1213759).\n- fix documentation of panic_on_warn (git-fixes).\n- fs: dlm: add midcomms init/start functions (git-fixes).\n- fs: dlm: do not set stop rx flag after node reset (git-fixes).\n- fs: dlm: filter user dlm messages for kernel locks (git-fixes).\n- fs: dlm: fix log of lowcomms vs midcomms (git-fixes).\n- fs: dlm: fix race between test_bit() and queue_work() (git-fixes).\n- fs: dlm: fix race in lowcomms (git-fixes).\n- fs: dlm: handle -ebusy first in lock arg validation (git-fixes).\n- fs: dlm: move sending fin message into state change handling (git-fixes).\n- fs: dlm: retry accept() until -eagain or error returns (git-fixes).\n- fs: dlm: return positive pid value for f_getlk (git-fixes).\n- fs: dlm: start midcomms before scand (git-fixes).\n- fs: hfsplus: remove warn_on() from hfsplus_cat_{read,write}_inode() (git-fixes).\n- fs: jfs: check for read-only mounted filesystem in txbegin (git-fixes).\n- fs: jfs: fix null-ptr-deref read in txbegin (git-fixes).\n- fs: jfs: fix ubsan: array-index-out-of-bounds in dballocdmaplev (git-fixes).\n- fuse: ioctl: translate enosys in outarg (bsc#1213524).\n- fuse: revalidate: do not invalidate if interrupted (bsc#1213523).\n- gve: set default duplex configuration to full (git-fixes).\n- gve: unify driver name usage (git-fixes).\n- hvcs: fix hvcs port reference counting (bsc#1213134 ltc#202861).\n- hvcs: get reference to tty in remove (bsc#1213134 ltc#202861).\n- hvcs: synchronize hotplug remove with port free (bsc#1213134 ltc#202861).\n- hvcs: use dev_groups to manage hvcs device attributes (bsc#1213134 ltc#202861).\n- hvcs: use driver groups to manage driver attributes (bsc#1213134 ltc#202861).\n- hvcs: use vhangup in hotplug remove (bsc#1213134 ltc#202861).\n- hwmon: (adm1275) allow setting sample averaging (git-fixes).\n- hwmon: (k10temp) enable amd3255 proc to show negative temperature (git-fixes).\n- hwmon: (nct7802) fix for temp6 (peci1) processed even if peci1 disabled (git-fixes).\n- hwmon: (pmbus/adm1275) fix problems with temperature monitoring on adm1272 (git-fixes).\n- i2c: xiic: defer xiic_wakeup() and __xiic_start_xfer() in xiic_process() (git-fixes).\n- i2c: xiic: do not try to handle more interrupt events after error (git-fixes).\n- iavf: fix out-of-bounds when setting channels on remove (git-fixes).\n- iavf: fix use-after-free in free_netdev (git-fixes).\n- iavf: use internal state to free traffic irqs (git-fixes).\n- ib/hfi1: use bitmap_zalloc() when applicable (git-fixes)\n- igc: check if hardware tx timestamping is enabled earlier (git-fixes).\n- igc: enable and fix rx hash usage by netstack (git-fixes).\n- igc: fix inserting of empty frame for launchtime (git-fixes).\n- igc: fix kernel panic during ndo_tx_timeout callback (git-fixes).\n- igc: fix launchtime before start of cycle (git-fixes).\n- igc: fix race condition in ptp tx code (git-fixes).\n- igc: handle pps start time programming for past time values (git-fixes).\n- igc: prevent garbled tx queue with xdp zerocopy (git-fixes).\n- igc: remove delay during tx ring configuration (git-fixes).\n- igc: set tp bit in 'supported' and 'advertising' fields of ethtool_link_ksettings (git-fixes).\n- igc: work around hw bug causing missing timestamps (git-fixes).\n- inotify: avoid reporting event with invalid wd (bsc#1213025).\n- input: i8042 - add clevo pcx0dx to i8042 quirk table (git-fixes).\n- input: iqs269a - do not poll during ati (git-fixes).\n- input: iqs269a - do not poll during suspend or resume (git-fixes).\n- jbd2: fix data missing when reusing bh which is ready to be checkpointed (bsc#1213095).\n- jdb2: do not refuse invalidation of already invalidated buffers (bsc#1213014).\n- jffs2: fix memory leak in jffs2_do_fill_super (git-fixes).\n- jffs2: fix memory leak in jffs2_do_mount_fs (git-fixes).\n- jffs2: fix memory leak in jffs2_scan_medium (git-fixes).\n- jffs2: fix use-after-free in jffs2_clear_xattr_subsystem (git-fixes).\n- jffs2: gc deadlock reading a page that is used in jffs2_write_begin() (git-fixes).\n- jffs2: reduce stack usage in jffs2_build_xattr_subsystem() (git-fixes).\n- jfs: jfs_dmap: validate db_l2nbperpage while mounting (git-fixes).\n- kabi/severities: add vas symbols changed due to recent fix vas accelerators are directly tied to the architecture, there is no reason to have out-of-tree production drivers\n- kabi: do not check external trampolines for signature (kabi bsc#1207894 bsc#1211243).\n- kernel-binary.spec.in: remove superfluous %% in supplements fixes: 02b7735e0caf ('rpm/kernel-binary.spec.in: add enhances and supplements tags to in-tree kmps')\n- kselftest: vdso: fix accumulation of uninitialized ret when clock_realtime is undefined (git-fixes).\n- kvm: arm64: do not read a hw interrupt pending state in user context (git-fixes)\n- kvm: arm64: warn if accessing timer pending state outside of vcpu (bsc#1213620)\n- kvm: do not null dereference ops->destroy (git-fixes)\n- kvm: downgrade two bug_ons to warn_on_once (git-fixes)\n- kvm: initialize debugfs_dentry when a vm is created to avoid null (git-fixes)\n- kvm: s390: pv: fix index value of replaced asce (git-fixes bsc#1213867).\n- kvm: vmx: inject #gp on encls if vcpu has paging disabled (cr0.pg==0) (git-fixes).\n- kvm: vmx: inject #gp, not #ud, if sgx2 encls leafs are unsupported (git-fixes).\n- kvm: vmx: restore vmx_vmexit alignment (git-fixes).\n- kvm: x86: account fastpath-only vm-exits in vcpu stats (git-fixes).\n- leds: trigger: netdev: recheck netdev_led_mode_linkup on dev rename (git-fixes).\n- libceph: harden msgr2.1 frame segment length checks (bsc#1213857).\n- media: atomisp: gmin_platform: fix out_len in gmin_get_config_dsm_var() (git-fixes).\n- media: cec: i2c: ch7322: also select regmap (git-fixes).\n- media: i2c: correct format propagation for st-mipid02 (git-fixes).\n- media: staging: atomisp: select v4l2_fwnode (git-fixes).\n- media: usb: check az6007_read() return value (git-fixes).\n- media: usb: siano: fix warning due to null work_func_t function pointer (git-fixes).\n- media: venus: helpers: fix align() of non power of two (git-fixes).\n- media: videodev2.h: fix struct v4l2_input tuner index comment (git-fixes).\n- memcg: drop kmem.limit_in_bytes (bsc#1208788, bsc#1212905).\n- mmc: core: disable trim on kingston emmc04g-m627 (git-fixes).\n- mmc: sdhci: fix dma configure compatibility issue when 64bit dma mode is used (git-fixes).\n- net/sched: sch_qfq: refactor parsing of netlink parameters (bsc#1213585).\n- net/sched: sch_qfq: reintroduce lmax bound check for mtu (bsc#1213585).\n- net: ena: fix shift-out-of-bounds in exponential backoff (git-fixes).\n- net: mana: add support for vlan tagging (bsc#1212301).\n- net: mana: batch ringing rx queue doorbell on receiving packets (bsc#1212901).\n- net: mana: use the correct wqe count for ringing rq doorbell (bsc#1212901).\n- net: phy: marvell10g: fix 88x3310 power up (git-fixes).\n- net: phy: prevent stale pointer dereference in phy_init() (git-fixes).\n- nfsd: add encoding of op_recall flag for write delegation (git-fixes).\n- nfsd: fix double fget() bug in __write_ports_addfd() (git-fixes).\n- nfsd: fix sparse warning (git-fixes).\n- nfsd: remove open coding of string copy (git-fixes).\n- nfsv4.1: always send a reclaim_complete after establishing lease (git-fixes).\n- nfsv4.1: freeze the session table upon receiving nfs4err_badsession (git-fixes).\n- ntb: amd: fix error handling in amd_ntb_pci_driver_init() (git-fixes).\n- ntb: idt: fix error handling in idt_pci_driver_init() (git-fixes).\n- ntb: intel: fix error handling in intel_ntb_pci_driver_init() (git-fixes).\n- ntb: ntb_tool: add check for devm_kcalloc (git-fixes).\n- ntb: ntb_transport: fix possible memory leak while device_register() fails (git-fixes).\n- nvme-multipath: support io stats on the mpath device (bsc#1210565).\n- nvme-pci: fix dma direction of unmapping integrity data (git-fixes).\n- nvme-pci: remove nvme_queue from nvme_iod (git-fixes).\n- nvme: introduce nvme_start_request (bsc#1210565).\n- ocfs2: check new file size on fallocate call (git-fixes).\n- ocfs2: fix use-after-free when unmounting read-only filesystem (git-fixes).\n- ocfs2: switch to security_inode_init_security() (git-fixes).\n- octeontx-af: fix hardware timestamp configuration (git-fixes).\n- octeontx2-af: move validation of ptp pointer before its usage (git-fixes).\n- octeontx2-pf: add additional check for mcam rules (git-fixes).\n- opp: fix use-after-free in lazy_opp_tables after probe deferral (git-fixes).\n- pci/pm: avoid putting elopos e2/s2/h2 pcie ports in d3cold (git-fixes).\n- pci: add function 1 dma alias quirk for marvell 88se9235 (git-fixes).\n- phy: hisilicon: fix an out of bounds check in hisi_inno_phy_probe() (git-fixes).\n- phy: revert 'phy: remove soc_exynos4212 dep. from phy_exynos4x12_usb' (git-fixes).\n- phy: tegra: xusb: check return value of devm_kzalloc() (git-fixes).\n- phy: tegra: xusb: clear the driver reference in usb-phy dev (git-fixes).\n- pie: fix kernel-doc notation warning (git-fixes).\n- pinctrl: amd: detect internal gpio0 debounce handling (git-fixes).\n- pinctrl: amd: do not show `invalid config param` errors (git-fixes).\n- pinctrl: amd: fix mistake in handling clearing pins at startup (git-fixes).\n- pinctrl: amd: only use special debounce behavior for gpio 0 (git-fixes).\n- pinctrl: amd: use amd_pinconf_set() for all config options (git-fixes).\n- platform/x86: msi-laptop: fix rfkill out-of-sync on msi wind u100 (git-fixes).\n- powerpc/64: only warn if __pa()/__va() called with bad addresses (bsc#1194869).\n- powerpc/64s: fix vas mm use after free (bsc#1194869).\n- powerpc/book3s64/mm: fix directmap stats in /proc/meminfo (bsc#1194869).\n- powerpc/bpf: fix use of user_pt_regs in uapi (bsc#1194869).\n- powerpc/ftrace: remove ftrace init tramp once kernel init is complete (bsc#1194869).\n- powerpc/interrupt: do not read msr from interrupt_exit_kernel_prepare() (bsc#1194869).\n- powerpc/mm/dax: fix the condition when checking if altmap vmemap can cross-boundary (bsc#1150305 ltc#176097 git-fixes).\n- powerpc/mm: switch obsolete dssall to .long (bsc#1194869).\n- powerpc/powernv/sriov: perform null check on iov before dereferencing iov (bsc#1194869).\n- powerpc/powernv/vas: assign real address to rx_fifo in vas_rx_win_attr (bsc#1194869).\n- powerpc/prom_init: fix kernel config grep (bsc#1194869).\n- powerpc/secvar: fix refcount leak in format_show() (bsc#1194869).\n- powerpc/xics: fix refcount leak in icp_opal_init() (bsc#1194869).\n- powerpc: clean vdso32 and vdso64 directories (bsc#1194869).\n- powerpc: define get_cycles macro for arch-override (bsc#1194869).\n- powerpc: update ppc_save_regs to save current r1 in pt_regs (bsc#1194869).\n- pwm: ab8500: fix error code in probe() (git-fixes).\n- pwm: imx-tpm: force 'real_period' to be zero in suspend (git-fixes).\n- pwm: sysfs: do not apply state to already disabled pwms (git-fixes).\n- rdma/bnxt_re: fix hang during driver unload (git-fixes)\n- rdma/bnxt_re: prevent handling any completions after qp destroy (git-fixes)\n- rdma/core: update cma destination address on rdma_resolve_addr (git-fixes)\n- rdma/irdma: add missing read barriers (git-fixes)\n- rdma/irdma: fix data race on cqp completion stats (git-fixes)\n- rdma/irdma: fix data race on cqp request done (git-fixes)\n- rdma/irdma: fix op_type reporting in cqes (git-fixes)\n- rdma/irdma: report correct wc error (git-fixes)\n- rdma/mlx4: make check for invalid flags stricter (git-fixes)\n- rdma/mthca: fix crash when polling cq for shared qps (git-fixes)\n- rdma/rxe: fix access checks in rxe_check_bind_mw (git-fixes)\n- regmap: account for register length in smbus i/o limits (git-fixes).\n- regmap: drop initial version of maximum transfer length fixes (git-fixes).\n- revert 'arm64: dts: zynqmp: add address-cells property to interrupt (git-fixes)\n- revert 'debugfs, coccinelle: check for obsolete define_simple_attribute() usage' (git-fixes).\n- revert 'drm/amd/display: edp do not add non-edid timings' (git-fixes).\n- revert 'nfsv4: retry lock on old_stateid during delegation return' (git-fixes).\n- revert 'usb: dwc3: core: enable autoretry feature in the controller' (git-fixes).\n- revert 'usb: gadget: tegra-xudc: fix error check in tegra_xudc_powerdomain_init()' (git-fixes).\n- revert 'usb: xhci: tegra: fix error check' (git-fixes).\n- revert 'xhci: add quirk for host controllers that do not update endpoint dcs' (git-fixes).\n- rpm/check-for-config-changes: ignore also riscv_isa_* and dynamic_sigframe they depend on config_toolchain_has_*.\n- rpm: update dependency to match current kmod.\n- rsi: remove kernel-doc comment marker (git-fixes).\n- rxrpc, afs: fix selection of abort codes (git-fixes).\n- s390/ap: fix status returned by ap_aqic() (git-fixes bsc#1213259).\n- s390/ap: fix status returned by ap_qact() (git-fixes bsc#1213258).\n- s390/bpf: add expoline to tail calls (git-fixes bsc#1213870).\n- s390/dasd: fix hanging device after quiesce/resume (git-fixes bsc#1213810).\n- s390/debug: add _asm_s390_ prefix to header guard (git-fixes bsc#1213263).\n- s390/decompressor: specify __decompress() buf len to avoid overflow (git-fixes bsc#1213863).\n- s390/ipl: add missing intersection check to ipl_report handling (git-fixes bsc#1213871).\n- s390/percpu: add read_once() to arch_this_cpu_to_op_simple() (git-fixes bsc#1213252).\n- s390/qeth: fix vipa deletion (git-fixes bsc#1213713).\n- s390/vmem: fix empty page tables cleanup under kasan (git-fixes bsc#1213715).\n- s390: define runtime_discard_exit to fix link error with gnu ld < 2.36 (git-fixes bsc#1213264).\n- s390: discard .interp section (git-fixes bsc#1213247).\n- s390: introduce nospec_uses_trampoline() (git-fixes bsc#1213870).\n- scftorture: count reschedule ipis (git-fixes).\n- sched/debug: fix dentry leak in update_sched_domain_debugfs (git-fixes)\n- sched: fix debug && !schedstats warn (git-fixes)\n- scsi: lpfc: abort outstanding els cmds when mailbox timeout error is detected (bsc#1213756).\n- scsi: lpfc: avoid -wstringop-overflow warning (bsc#1213756).\n- scsi: lpfc: clean up sli-4 sysfs resource reporting (bsc#1213756).\n- scsi: lpfc: copyright updates for 14.2.0.14 patches (bsc#1213756).\n- scsi: lpfc: fix a possible data race in lpfc_unregister_fcf_rescan() (bsc#1213756).\n- scsi: lpfc: fix incorrect big endian type assignment in bsg loopback path (bsc#1213756).\n- scsi: lpfc: fix incorrect big endian type assignments in fdmi and vmid paths (bsc#1213756).\n- scsi: lpfc: fix lpfc_name struct packing (bsc#1213756).\n- scsi: lpfc: make fabric zone discovery more robust when handling unsolicited logo (bsc#1213756).\n- scsi: lpfc: pull out fw diagnostic dump log message from driver's trace buffer (bsc#1213756).\n- scsi: lpfc: qualify ndlp discovery state when processing rscn (bsc#1213756).\n- scsi: lpfc: refactor cpu affinity assignment paths (bsc#1213756).\n- scsi: lpfc: remove extra ndlp kref decrement in flogi cmpl for loop topology (bsc#1213756).\n- scsi: lpfc: replace all non-returning strlcpy() with strscpy() (bsc#1213756).\n- scsi: lpfc: replace one-element array with flexible-array member (bsc#1213756).\n- scsi: lpfc: revise ndlp kref handling for dev_loss_tmo_callbk and lpfc_drop_node (bsc#1213756).\n- scsi: lpfc: set establish image pair service parameter only for target functions (bsc#1213756).\n- scsi: lpfc: simplify fcp_abort transport callback log message (bsc#1213756).\n- scsi: lpfc: update lpfc version to 14.2.0.14 (bsc#1213756).\n- scsi: lpfc: use struct_size() helper (bsc#1213756).\n- scsi: qla2xxx: adjust iocb resource on qpair create (bsc#1213747).\n- scsi: qla2xxx: array index may go out of bound (bsc#1213747).\n- scsi: qla2xxx: avoid fcport pointer dereference (bsc#1213747).\n- scsi: qla2xxx: check valid rport returned by fc_bsg_to_rport() (bsc#1213747).\n- scsi: qla2xxx: correct the index of array (bsc#1213747).\n- scsi: qla2xxx: drop useless list_head (bsc#1213747).\n- scsi: qla2xxx: fix buffer overrun (bsc#1213747).\n- scsi: qla2xxx: fix command flush during tmf (bsc#1213747).\n- scsi: qla2xxx: fix deletion race condition (bsc#1213747).\n- scsi: qla2xxx: fix end of loop test (bsc#1213747).\n- scsi: qla2xxx: fix erroneous link up failure (bsc#1213747).\n- scsi: qla2xxx: fix error code in qla2x00_start_sp() (bsc#1213747).\n- scsi: qla2xxx: fix inconsistent tmf timeout (bsc#1213747).\n- scsi: qla2xxx: fix null pointer dereference in target mode (bsc#1213747).\n- scsi: qla2xxx: fix potential null pointer dereference (bsc#1213747).\n- scsi: qla2xxx: fix session hang in gnl (bsc#1213747).\n- scsi: qla2xxx: fix tmf leak through (bsc#1213747).\n- scsi: qla2xxx: limit tmf to 8 per function (bsc#1213747).\n- scsi: qla2xxx: pointer may be dereferenced (bsc#1213747).\n- scsi: qla2xxx: remove unused nvme_ls_waitq wait queue (bsc#1213747).\n- scsi: qla2xxx: replace one-element array with declare_flex_array() helper (bsc#1213747).\n- scsi: qla2xxx: silence a static checker warning (bsc#1213747).\n- scsi: qla2xxx: turn off noisy message log (bsc#1213747).\n- scsi: qla2xxx: update version to 10.02.08.400-k (bsc#1213747).\n- scsi: qla2xxx: update version to 10.02.08.500-k (bsc#1213747).\n- scsi: qla2xxx: use vmalloc_array() and vcalloc() (bsc#1213747).\n- security: keys: modify mismatched function name (git-fixes).\n- selftests: mptcp: depend on syn_cookies (git-fixes).\n- selftests: mptcp: sockopt: return error if wrong mark (git-fixes).\n- selftests: rtnetlink: remove netdevsim device after ipsec offload test (git-fixes).\n- selftests: tc: add 'ct' action kconfig dep (git-fixes).\n- selftests: tc: add conntrack procfs kconfig (git-fixes).\n- selftests: tc: set timeout to 15 minutes (git-fixes).\n- serial: qcom-geni: drop bogus runtime pm state update (git-fixes).\n- serial: sifive: fix sifive_serial_console_setup() section (git-fixes).\n- signal/powerpc: on swapcontext failure force sigsegv (bsc#1194869).\n- signal: replace force_sigsegv(sigsegv) with force_fatal_sig(sigsegv) (bsc#1194869).\n- smb3: do not reserve too many oplock credits (bsc#1193629).\n- smb3: missing null check in smb2_change_notify (bsc#1193629).\n- smb: client: fix broken file attrs with nodfs mounts (bsc#1193629).\n- smb: client: fix missed ses refcounting (git-fixes).\n- smb: client: fix parsing of source mount option (bsc#1193629).\n- smb: client: fix shared dfs root mounts with different prefixes (bsc#1193629).\n- smb: client: fix warning in cifs_match_super() (bsc#1193629).\n- smb: client: fix warning in cifs_smb3_do_mount() (bsc#1193629).\n- smb: client: fix warning in cifsfindfirst() (bsc#1193629).\n- smb: client: fix warning in cifsfindnext() (bsc#1193629).\n- smb: client: fix warning in generic_ip_connect() (bsc#1193629).\n- smb: client: improve dfs mount check (bsc#1193629).\n- smb: client: remove redundant pointer 'server' (bsc#1193629).\n- smb: delete an unnecessary statement (bsc#1193629).\n- smb: move client and server files to common directory fs/smb (bsc#1193629).\n- smb: remove obsolete comment (bsc#1193629).\n- soundwire: qcom: fix storing port config out-of-bounds (git-fixes).\n- soundwire: qcom: update status correctly with mask (git-fixes).\n- spi: bcm-qspi: return error if neither hif_mspi nor mspi is available (git-fixes).\n- spi: bcm63xx: fix max prepend length (git-fixes).\n- staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() (git-fixes).\n- staging: r8712: fix memory leak in _r8712_init_xmit_priv() (git-fixes).\n- sunrpc: always free ctxt when freeing deferred request (git-fixes).\n- sunrpc: double free xprt_ctxt while still in use (git-fixes).\n- sunrpc: fix trace_svc_register() call site (git-fixes).\n- sunrpc: fix uaf in svc_tcp_listen_data_ready() (git-fixes).\n- sunrpc: remove dead code in svc_tcp_release_rqst() (git-fixes).\n- sunrpc: remove the maximum number of retries in call_bind_status (git-fixes).\n- svcrdma: prevent page release when nothing was received (git-fixes).\n- tpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation (git-fixes).\n- tpm_tis: explicitly check for error code (git-fixes).\n- tty: n_gsm: fix uaf in gsm_cleanup_mux (git-fixes).\n- tty: serial: fsl_lpuart: add earlycon for imx8ulp platform (git-fixes).\n- ubi: ensure that vid header offset + vid header size <= alloc, size (bsc#1210584).\n- ubi: fix failure attaching when vid_hdr offset equals to (sub)page size (bsc#1210584).\n- ubifs: add missing iput if do_tmpfile() failed in rename whiteout (git-fixes).\n- ubifs: do_rename: fix wrong space budget when target inode's nlink > 1 (git-fixes).\n- ubifs: error path in ubifs_remount_rw() seems to wrongly free write buffers (git-fixes).\n- ubifs: fix 'ui->dirty' race between do_tmpfile() and writeback work (git-fixes).\n- ubifs: fix aa deadlock when setting xattr for encrypted file (git-fixes).\n- ubifs: fix build errors as symbol undefined (git-fixes).\n- ubifs: fix deadlock in concurrent rename whiteout and inode writeback (git-fixes).\n- ubifs: fix memory leak in alloc_wbufs() (git-fixes).\n- ubifs: fix memory leak in do_rename (git-fixes).\n- ubifs: fix read out-of-bounds in ubifs_wbuf_write_nolock() (git-fixes).\n- ubifs: fix to add refcount once page is set private (git-fixes).\n- ubifs: fix wrong dirty space budget for dirty inode (git-fixes).\n- ubifs: free memory for tmpfile name (git-fixes).\n- ubifs: rectify space amount budget for mkdir/tmpfile operations (git-fixes).\n- ubifs: rectify space budget for ubifs_symlink() if symlink is encrypted (git-fixes).\n- ubifs: rectify space budget for ubifs_xrename() (git-fixes).\n- ubifs: rename whiteout atomically (git-fixes).\n- ubifs: rename_whiteout: correct old_dir size computing (git-fixes).\n- ubifs: rename_whiteout: fix double free for whiteout_ui->data (git-fixes).\n- ubifs: reserve one leb for each journal head while doing budget (git-fixes).\n- ubifs: setflags: make dirtied_ino_d 8 bytes aligned (git-fixes).\n- ubifs: ubifs_writepage: mark page dirty after writing inode failed (git-fixes).\n- udf: avoid double brelse() in udf_rename() (bsc#1213032).\n- udf: define efscorrupted error code (bsc#1213038).\n- udf: detect system inodes linked into directory hierarchy (bsc#1213114).\n- udf: discard preallocation before extending file with a hole (bsc#1213036).\n- udf: do not bother looking for prealloc extents if i_lenextents matches i_size (bsc#1213035).\n- udf: do not bother merging very long extents (bsc#1213040).\n- udf: do not update file length for failed writes to inline files (bsc#1213041).\n- udf: fix error handling in udf_new_inode() (bsc#1213112).\n- udf: fix extending file within last block (bsc#1213037).\n- udf: fix preallocation discarding at indirect extent boundary (bsc#1213034).\n- udf: preserve link count of system files (bsc#1213113).\n- udf: truncate added extents on failed expansion (bsc#1213039).\n- update config and supported.conf files due to renaming.\n- update suse/rdma-mthca-fix-crash-when-polling-cq-for-shared-qps. (git-fixes bsc#1212604). added bug reference.\n- usb: dwc2: fix some error handling paths (git-fixes).\n- usb: dwc2: platform: improve error reporting for problems during .remove() (git-fixes).\n- usb: dwc3: do not reset device side if dwc3 was configured as host-only (git-fixes).\n- usb: dwc3: pci: skip byt gpio lookup table for hardwired phy (git-fixes).\n- usb: gadget: core: remove unbalanced mutex_unlock in usb_gadget_activate (git-fixes).\n- usb: gadget: udc: core: offload usb_udc_vbus_handler processing (git-fixes).\n- usb: gadget: udc: core: prevent soft_connect_store() race (git-fixes).\n- usb: serial: option: add lara-r6 01b pids (git-fixes).\n- usb: xhci-mtk: set the dma max_seg_size (git-fixes).\n- vhost: support packed when setting-getting vring_base (git-fixes).\n- vhost_net: revert upend_idx only on retriable error (git-fixes).\n- virtio-net: maintain reverse cleanup order (git-fixes).\n- virtio_net: fix error unwinding of xdp initialization (git-fixes).\n- wifi: airo: avoid uninitialized warning in airo_get_rate() (git-fixes).\n- wifi: ray_cs: drop useless status variable in parse_addr() (git-fixes).\n- wifi: ray_cs: utilize strnlen() in parse_addr() (git-fixes).\n- wifi: rtw89: debug: fix error code in rtw89_debug_priv_send_h2c_set() (git-fixes).\n- wl3501_cs: use eth_hw_addr_set() (git-fixes).\n- writeback: fix call of incorrect macro (bsc#1213024).\n- x86/pvh: obtain vga console info in dom0 (git-fixes).\n- x86: fix .brk attribute in linker script (git-fixes).\n- xen/blkfront: only check req_fua for writes (git-fixes).\n- xen/pvcalls-back: fix double frees with pvcalls_new_active_socket() (git-fixes).\n- xfs: ail needs asynchronous cil forcing (bsc#1211811).\n- xfs: async cil flushes need pending pushes to be made stable (bsc#1211811).\n- xfs: attach iclog callbacks in xlog_cil_set_ctx_write_state() (bsc#1211811).\n- xfs: cil work is serialised, not pipelined (bsc#1211811).\n- xfs: clean up the rtbitmap fsmap backend (git-fixes).\n- xfs: do not deplete the reserve pool when trying to shrink the fs (git-fixes).\n- xfs: do not reverse order of items in bulk ail insertion (git-fixes).\n- xfs: do not run shutdown callbacks on active iclogs (bsc#1211811).\n- xfs: drop async cache flushes from cil commits (bsc#1211811).\n- xfs: factor out log write ordering from xlog_cil_push_work() (bsc#1211811).\n- xfs: fix getfsmap reporting past the last rt extent (git-fixes).\n- xfs: fix integer overflows in the fsmap rtbitmap and logdev backends (git-fixes).\n- xfs: fix interval filtering in multi-step fsmap queries (git-fixes).\n- xfs: fix logdev fsmap query result filtering (git-fixes).\n- xfs: fix off-by-one error when the last rt extent is in use (git-fixes).\n- xfs: fix uninitialized variable access (git-fixes).\n- xfs: make fsmap backend function key parameters const (git-fixes).\n- xfs: make the record pointer passed to query_range functions const (git-fixes).\n- xfs: move the cil workqueue to the cil (bsc#1211811).\n- xfs: move xlog_commit_record to xfs_log_cil.c (bsc#1211811).\n- xfs: order cil checkpoint start records (bsc#1211811).\n- xfs: pass a cil context to xlog_write() (bsc#1211811).\n- xfs: pass explicit mount pointer to rtalloc query functions (git-fixes).\n- xfs: rework xlog_state_do_callback() (bsc#1211811).\n- xfs: run callbacks before waking waiters in xlog_state_shutdown_callbacks (bsc#1211811).\n- xfs: separate out log shutdown callback processing (bsc#1211811).\n- xfs: wait iclog complete before tearing down ail (bsc#1211811).\n- xfs: xlog_state_ioerror must die (bsc#1211811).\n- xhci: fix resume issue of some zhaoxin hosts (git-fixes).\n- xhci: fix trb prefetch issue of zhaoxin hosts (git-fixes).\n- xhci: show zhaoxin xhci root hub speed correctly (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-3318,SUSE-SLE-Micro-5.3-2023-3318,SUSE-SLE-Micro-5.4-2023-3318,SUSE-SLE-Module-Live-Patching-15-SP4-2023-3318,SUSE-SLE-Module-RT-15-SP4-2023-3318,openSUSE-Leap-Micro-5.3-2023-3318,openSUSE-Leap-Micro-5.4-2023-3318,openSUSE-SLE-15.4-2023-3318", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3318-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:3318-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20233318-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:3318-1", url: "https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html", }, { category: "self", summary: "SUSE Bug 1150305", url: "https://bugzilla.suse.com/1150305", }, { category: "self", summary: "SUSE Bug 1193629", url: "https://bugzilla.suse.com/1193629", }, { category: "self", summary: "SUSE Bug 1194869", url: "https://bugzilla.suse.com/1194869", }, { category: "self", summary: "SUSE Bug 1206418", url: "https://bugzilla.suse.com/1206418", }, { category: "self", summary: "SUSE Bug 1207129", url: "https://bugzilla.suse.com/1207129", }, { category: "self", summary: "SUSE Bug 1207894", url: "https://bugzilla.suse.com/1207894", }, { category: "self", summary: "SUSE Bug 1208788", url: "https://bugzilla.suse.com/1208788", }, { category: "self", summary: "SUSE Bug 1210565", url: "https://bugzilla.suse.com/1210565", }, { category: "self", summary: "SUSE Bug 1210584", url: "https://bugzilla.suse.com/1210584", }, { category: "self", summary: "SUSE Bug 1210627", url: "https://bugzilla.suse.com/1210627", }, { category: "self", summary: "SUSE Bug 1210780", url: "https://bugzilla.suse.com/1210780", }, { category: "self", summary: "SUSE Bug 1210853", url: "https://bugzilla.suse.com/1210853", }, { category: "self", summary: "SUSE Bug 1211131", url: "https://bugzilla.suse.com/1211131", }, { category: "self", summary: "SUSE Bug 1211243", url: "https://bugzilla.suse.com/1211243", }, { category: "self", summary: "SUSE Bug 1211738", url: "https://bugzilla.suse.com/1211738", }, { category: "self", summary: "SUSE Bug 1211811", url: "https://bugzilla.suse.com/1211811", }, { category: "self", summary: "SUSE Bug 1211867", url: "https://bugzilla.suse.com/1211867", }, { category: "self", summary: "SUSE Bug 1212301", url: "https://bugzilla.suse.com/1212301", }, { category: "self", summary: "SUSE Bug 1212502", url: "https://bugzilla.suse.com/1212502", }, { category: "self", summary: "SUSE Bug 1212604", url: "https://bugzilla.suse.com/1212604", }, { category: "self", summary: "SUSE Bug 1212846", url: "https://bugzilla.suse.com/1212846", }, { category: "self", summary: "SUSE Bug 1212901", url: "https://bugzilla.suse.com/1212901", }, { category: "self", summary: "SUSE Bug 1212905", url: "https://bugzilla.suse.com/1212905", }, { category: "self", summary: "SUSE Bug 1213010", url: "https://bugzilla.suse.com/1213010", }, { category: "self", summary: "SUSE Bug 1213011", url: "https://bugzilla.suse.com/1213011", }, { category: "self", summary: "SUSE Bug 1213012", url: "https://bugzilla.suse.com/1213012", }, { category: "self", summary: "SUSE Bug 1213013", url: "https://bugzilla.suse.com/1213013", }, { category: "self", summary: "SUSE Bug 1213014", url: "https://bugzilla.suse.com/1213014", }, { category: "self", summary: "SUSE Bug 1213015", url: "https://bugzilla.suse.com/1213015", }, { category: "self", summary: "SUSE Bug 1213016", url: "https://bugzilla.suse.com/1213016", }, { category: "self", summary: "SUSE Bug 1213017", url: "https://bugzilla.suse.com/1213017", }, { category: "self", summary: "SUSE Bug 1213018", url: "https://bugzilla.suse.com/1213018", }, { category: "self", summary: "SUSE Bug 1213019", url: "https://bugzilla.suse.com/1213019", }, { category: "self", summary: "SUSE Bug 1213020", url: "https://bugzilla.suse.com/1213020", }, { category: "self", summary: "SUSE Bug 1213021", url: "https://bugzilla.suse.com/1213021", }, { category: "self", summary: "SUSE Bug 1213024", url: "https://bugzilla.suse.com/1213024", }, { category: "self", summary: "SUSE Bug 1213025", url: "https://bugzilla.suse.com/1213025", }, { category: "self", summary: "SUSE Bug 1213032", url: "https://bugzilla.suse.com/1213032", }, { category: "self", summary: "SUSE Bug 1213034", url: "https://bugzilla.suse.com/1213034", }, { category: "self", summary: "SUSE Bug 1213035", url: "https://bugzilla.suse.com/1213035", }, { category: "self", summary: "SUSE Bug 1213036", url: "https://bugzilla.suse.com/1213036", }, { category: "self", summary: "SUSE Bug 1213037", url: "https://bugzilla.suse.com/1213037", }, { category: "self", summary: "SUSE Bug 1213038", url: "https://bugzilla.suse.com/1213038", }, { category: "self", summary: "SUSE Bug 1213039", url: "https://bugzilla.suse.com/1213039", }, { category: "self", summary: "SUSE Bug 1213040", url: "https://bugzilla.suse.com/1213040", }, { category: "self", summary: "SUSE Bug 1213041", url: "https://bugzilla.suse.com/1213041", }, { category: "self", summary: "SUSE Bug 1213059", url: "https://bugzilla.suse.com/1213059", }, { category: "self", summary: "SUSE Bug 1213061", url: "https://bugzilla.suse.com/1213061", }, { category: "self", summary: "SUSE Bug 1213087", url: "https://bugzilla.suse.com/1213087", }, { category: "self", summary: "SUSE Bug 1213088", url: "https://bugzilla.suse.com/1213088", }, { category: "self", summary: "SUSE Bug 1213089", url: "https://bugzilla.suse.com/1213089", }, { category: "self", summary: "SUSE Bug 1213090", url: "https://bugzilla.suse.com/1213090", }, { category: "self", summary: "SUSE Bug 1213092", url: "https://bugzilla.suse.com/1213092", }, { category: "self", summary: "SUSE Bug 1213093", url: "https://bugzilla.suse.com/1213093", }, { category: "self", summary: "SUSE Bug 1213094", url: "https://bugzilla.suse.com/1213094", }, { category: "self", summary: "SUSE Bug 1213095", url: "https://bugzilla.suse.com/1213095", }, { category: "self", summary: "SUSE Bug 1213096", url: "https://bugzilla.suse.com/1213096", }, { category: "self", summary: "SUSE Bug 1213098", url: "https://bugzilla.suse.com/1213098", }, { category: "self", summary: "SUSE Bug 1213099", url: "https://bugzilla.suse.com/1213099", }, { category: "self", summary: "SUSE Bug 1213100", url: "https://bugzilla.suse.com/1213100", }, { category: "self", summary: "SUSE Bug 1213102", url: "https://bugzilla.suse.com/1213102", }, { category: "self", summary: "SUSE Bug 1213103", url: "https://bugzilla.suse.com/1213103", }, { category: "self", summary: "SUSE Bug 1213104", url: "https://bugzilla.suse.com/1213104", }, { category: "self", summary: "SUSE Bug 1213105", url: "https://bugzilla.suse.com/1213105", }, { category: "self", summary: "SUSE Bug 1213106", url: "https://bugzilla.suse.com/1213106", }, { category: "self", summary: "SUSE Bug 1213107", url: "https://bugzilla.suse.com/1213107", }, { category: "self", summary: "SUSE Bug 1213108", url: "https://bugzilla.suse.com/1213108", }, { category: "self", summary: "SUSE Bug 1213109", url: "https://bugzilla.suse.com/1213109", }, { category: "self", summary: "SUSE Bug 1213110", url: "https://bugzilla.suse.com/1213110", }, { category: "self", summary: "SUSE Bug 1213111", url: "https://bugzilla.suse.com/1213111", }, { category: "self", summary: "SUSE Bug 1213112", url: "https://bugzilla.suse.com/1213112", }, { category: "self", summary: "SUSE Bug 1213113", url: "https://bugzilla.suse.com/1213113", }, { category: "self", summary: "SUSE Bug 1213114", url: "https://bugzilla.suse.com/1213114", }, { category: "self", summary: "SUSE Bug 1213134", url: "https://bugzilla.suse.com/1213134", }, { category: "self", summary: "SUSE Bug 1213167", url: "https://bugzilla.suse.com/1213167", }, { category: "self", summary: "SUSE Bug 1213245", url: "https://bugzilla.suse.com/1213245", }, { category: "self", summary: "SUSE Bug 1213247", url: "https://bugzilla.suse.com/1213247", }, { category: "self", summary: "SUSE Bug 1213252", url: "https://bugzilla.suse.com/1213252", }, { category: "self", summary: "SUSE Bug 1213258", url: "https://bugzilla.suse.com/1213258", }, { category: "self", summary: "SUSE Bug 1213259", url: "https://bugzilla.suse.com/1213259", }, { category: "self", summary: "SUSE Bug 1213263", url: "https://bugzilla.suse.com/1213263", }, { category: "self", summary: "SUSE Bug 1213264", url: "https://bugzilla.suse.com/1213264", }, { category: "self", summary: "SUSE Bug 1213272", url: "https://bugzilla.suse.com/1213272", }, { category: "self", summary: "SUSE Bug 1213286", url: "https://bugzilla.suse.com/1213286", }, { category: "self", summary: "SUSE Bug 1213287", url: "https://bugzilla.suse.com/1213287", }, { category: "self", summary: "SUSE Bug 1213304", url: "https://bugzilla.suse.com/1213304", }, { category: "self", summary: "SUSE Bug 1213523", url: "https://bugzilla.suse.com/1213523", }, { category: "self", summary: "SUSE Bug 1213524", url: "https://bugzilla.suse.com/1213524", }, { category: "self", summary: "SUSE Bug 1213543", url: "https://bugzilla.suse.com/1213543", }, { category: "self", summary: "SUSE Bug 1213585", url: "https://bugzilla.suse.com/1213585", }, { category: "self", summary: "SUSE Bug 1213586", url: "https://bugzilla.suse.com/1213586", }, { category: "self", summary: "SUSE Bug 1213588", url: "https://bugzilla.suse.com/1213588", }, { category: "self", summary: "SUSE Bug 1213620", url: "https://bugzilla.suse.com/1213620", }, { category: "self", summary: "SUSE Bug 1213653", url: "https://bugzilla.suse.com/1213653", }, { category: "self", summary: "SUSE Bug 1213705", url: "https://bugzilla.suse.com/1213705", }, { category: "self", summary: "SUSE Bug 1213713", url: "https://bugzilla.suse.com/1213713", }, { category: "self", summary: "SUSE Bug 1213715", url: "https://bugzilla.suse.com/1213715", }, { category: "self", summary: "SUSE Bug 1213747", url: "https://bugzilla.suse.com/1213747", }, { category: "self", summary: "SUSE Bug 1213756", url: "https://bugzilla.suse.com/1213756", }, { category: "self", summary: "SUSE Bug 1213759", url: "https://bugzilla.suse.com/1213759", }, { category: "self", summary: "SUSE Bug 1213777", url: "https://bugzilla.suse.com/1213777", }, { category: "self", summary: "SUSE Bug 1213810", url: "https://bugzilla.suse.com/1213810", }, { category: "self", summary: "SUSE Bug 1213812", url: "https://bugzilla.suse.com/1213812", }, { category: "self", summary: "SUSE Bug 1213856", url: "https://bugzilla.suse.com/1213856", }, { category: "self", summary: "SUSE Bug 1213857", url: "https://bugzilla.suse.com/1213857", }, { category: "self", summary: "SUSE Bug 1213863", url: "https://bugzilla.suse.com/1213863", }, { category: "self", summary: "SUSE Bug 1213867", url: "https://bugzilla.suse.com/1213867", }, { category: "self", summary: "SUSE Bug 1213870", url: "https://bugzilla.suse.com/1213870", }, { category: "self", summary: "SUSE Bug 1213871", url: "https://bugzilla.suse.com/1213871", }, { category: "self", summary: "SUSE CVE CVE-2022-40982 page", url: "https://www.suse.com/security/cve/CVE-2022-40982/", }, { category: "self", summary: "SUSE CVE CVE-2023-0459 page", url: "https://www.suse.com/security/cve/CVE-2023-0459/", }, { category: "self", summary: "SUSE CVE CVE-2023-20569 page", url: "https://www.suse.com/security/cve/CVE-2023-20569/", }, { category: "self", summary: "SUSE CVE CVE-2023-20593 page", url: "https://www.suse.com/security/cve/CVE-2023-20593/", }, { category: "self", summary: "SUSE CVE CVE-2023-21400 page", url: "https://www.suse.com/security/cve/CVE-2023-21400/", }, { category: "self", summary: "SUSE CVE CVE-2023-2156 page", url: "https://www.suse.com/security/cve/CVE-2023-2156/", }, { category: "self", summary: "SUSE CVE CVE-2023-2166 page", url: "https://www.suse.com/security/cve/CVE-2023-2166/", }, { category: "self", summary: "SUSE CVE CVE-2023-2985 page", url: "https://www.suse.com/security/cve/CVE-2023-2985/", }, { category: "self", summary: "SUSE CVE CVE-2023-31083 page", url: "https://www.suse.com/security/cve/CVE-2023-31083/", }, { category: "self", summary: "SUSE CVE CVE-2023-3117 page", url: "https://www.suse.com/security/cve/CVE-2023-3117/", }, { category: "self", summary: "SUSE CVE CVE-2023-31248 page", url: "https://www.suse.com/security/cve/CVE-2023-31248/", }, { category: "self", summary: "SUSE CVE CVE-2023-3268 page", url: "https://www.suse.com/security/cve/CVE-2023-3268/", }, { category: "self", summary: "SUSE CVE CVE-2023-3390 page", url: "https://www.suse.com/security/cve/CVE-2023-3390/", }, { category: "self", summary: "SUSE CVE CVE-2023-35001 page", url: "https://www.suse.com/security/cve/CVE-2023-35001/", }, { category: "self", summary: "SUSE CVE CVE-2023-3567 page", url: "https://www.suse.com/security/cve/CVE-2023-3567/", }, { category: "self", summary: "SUSE CVE CVE-2023-3609 page", url: "https://www.suse.com/security/cve/CVE-2023-3609/", }, { category: "self", summary: "SUSE CVE CVE-2023-3611 page", url: "https://www.suse.com/security/cve/CVE-2023-3611/", }, { category: "self", summary: "SUSE CVE CVE-2023-3776 page", url: "https://www.suse.com/security/cve/CVE-2023-3776/", }, { category: "self", summary: "SUSE CVE CVE-2023-3812 page", url: "https://www.suse.com/security/cve/CVE-2023-3812/", }, { category: "self", summary: "SUSE CVE CVE-2023-4004 page", url: "https://www.suse.com/security/cve/CVE-2023-4004/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-08-15T08:34:21Z", generator: { date: "2023-08-15T08:34:21Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:3318-1", initial_release_date: "2023-08-15T08:34:21Z", revision_history: [ { date: "2023-08-15T08:34:21Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-5.14.21-150400.15.46.1.noarch", product: { name: "kernel-devel-rt-5.14.21-150400.15.46.1.noarch", product_id: "kernel-devel-rt-5.14.21-150400.15.46.1.noarch", }, }, { category: "product_version", name: "kernel-source-rt-5.14.21-150400.15.46.1.noarch", product: { name: "kernel-source-rt-5.14.21-150400.15.46.1.noarch", product_id: "kernel-source-rt-5.14.21-150400.15.46.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", product: { name: "cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", product_id: "cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", product: { name: "dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", product_id: "dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", product: { name: "gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", product_id: "gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", product: { name: "kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", product_id: "kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-5.14.21-150400.15.46.1.x86_64", product: { name: "kernel-rt-5.14.21-150400.15.46.1.x86_64", product_id: "kernel-rt-5.14.21-150400.15.46.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", product: { name: "kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", product_id: "kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-extra-5.14.21-150400.15.46.1.x86_64", product: { name: "kernel-rt-extra-5.14.21-150400.15.46.1.x86_64", product_id: "kernel-rt-extra-5.14.21-150400.15.46.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-5.14.21-150400.15.46.1.x86_64", product: { name: "kernel-rt-livepatch-5.14.21-150400.15.46.1.x86_64", product_id: "kernel-rt-livepatch-5.14.21-150400.15.46.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-devel-5.14.21-150400.15.46.1.x86_64", product: { name: "kernel-rt-livepatch-devel-5.14.21-150400.15.46.1.x86_64", product_id: "kernel-rt-livepatch-devel-5.14.21-150400.15.46.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-optional-5.14.21-150400.15.46.1.x86_64", product: { name: "kernel-rt-optional-5.14.21-150400.15.46.1.x86_64", product_id: "kernel-rt-optional-5.14.21-150400.15.46.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", product: { name: "kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", product_id: "kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", product: { name: "kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", product_id: "kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.46.1.x86_64", product: { name: "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.46.1.x86_64", product_id: "kernel-rt_debug-livepatch-devel-5.14.21-150400.15.46.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", product: { name: "kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", product_id: "kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt-5.14.21-150400.15.46.1.x86_64", product: { name: "kselftests-kmp-rt-5.14.21-150400.15.46.1.x86_64", product_id: "kselftests-kmp-rt-5.14.21-150400.15.46.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", product: { name: "ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", product_id: "ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt-5.14.21-150400.15.46.1.x86_64", product: { name: "reiserfs-kmp-rt-5.14.21-150400.15.46.1.x86_64", product_id: "reiserfs-kmp-rt-5.14.21-150400.15.46.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Micro 5.3", product: { name: "SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3", product_identification_helper: { cpe: "cpe:/o:suse:sle-micro:5.3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.4", product: { name: "SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4", product_identification_helper: { cpe: "cpe:/o:suse:sle-micro:5.4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP4", product: { name: "SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp4", }, }, }, { category: "product_name", name: "SUSE Real Time Module 15 SP4", product: { name: "SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-rt:15:sp4", }, }, }, { category: "product_name", name: "openSUSE Leap Micro 5.3", product: { name: "openSUSE Leap Micro 5.3", product_id: "openSUSE Leap Micro 5.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap-micro:5.3", }, }, }, { category: "product_name", name: "openSUSE Leap Micro 5.4", product: { name: "openSUSE Leap Micro 5.4", product_id: "openSUSE Leap Micro 5.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap-micro:5.4", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150400.15.46.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150400.15.46.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150400.15.46.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150400.15.46.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", }, product_reference: "kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", }, product_reference: "cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", }, product_reference: "dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", }, product_reference: "gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-5.14.21-150400.15.46.1.noarch as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", }, product_reference: "kernel-devel-rt-5.14.21-150400.15.46.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150400.15.46.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150400.15.46.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-5.14.21-150400.15.46.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", }, product_reference: "kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-5.14.21-150400.15.46.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", }, product_reference: "kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", }, product_reference: "kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.14.21-150400.15.46.1.noarch as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", }, product_reference: "kernel-source-rt-5.14.21-150400.15.46.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-5.14.21-150400.15.46.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", }, product_reference: "kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64 as component of SUSE Real Time Module 15 SP4", product_id: "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", }, product_reference: "ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150400.15.46.1.x86_64 as component of openSUSE Leap Micro 5.3", product_id: "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150400.15.46.1.x86_64", relates_to_product_reference: "openSUSE Leap Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150400.15.46.1.x86_64 as component of openSUSE Leap Micro 5.4", product_id: "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150400.15.46.1.x86_64", relates_to_product_reference: "openSUSE Leap Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", }, product_reference: "cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", }, product_reference: "dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", }, product_reference: "gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-5.14.21-150400.15.46.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", }, product_reference: "kernel-devel-rt-5.14.21-150400.15.46.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.14.21-150400.15.46.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", }, product_reference: "kernel-rt-5.14.21-150400.15.46.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-5.14.21-150400.15.46.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", }, product_reference: "kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-5.14.21-150400.15.46.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", }, product_reference: "kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", }, product_reference: "kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.14.21-150400.15.46.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", }, product_reference: "kernel-source-rt-5.14.21-150400.15.46.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-5.14.21-150400.15.46.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", }, product_reference: "kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", }, product_reference: "ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2022-40982", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-40982", }, ], notes: [ { category: "general", text: "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-40982", url: "https://www.suse.com/security/cve/CVE-2022-40982", }, { category: "external", summary: "SUSE Bug 1206418 for CVE-2022-40982", url: "https://bugzilla.suse.com/1206418", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2022-40982", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-15T08:34:21Z", details: "moderate", }, ], title: "CVE-2022-40982", }, { cve: "CVE-2023-0459", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-0459", }, ], notes: [ { category: "general", text: "Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the \"access_ok\" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-0459", url: "https://www.suse.com/security/cve/CVE-2023-0459", }, { category: "external", summary: "SUSE Bug 1211738 for CVE-2023-0459", url: "https://bugzilla.suse.com/1211738", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-0459", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-15T08:34:21Z", details: "moderate", }, ], title: "CVE-2023-0459", }, { cve: "CVE-2023-20569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-20569", }, ], notes: [ { category: "general", text: "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-20569", url: "https://www.suse.com/security/cve/CVE-2023-20569", }, { category: "external", summary: "SUSE Bug 1213287 for CVE-2023-20569", url: "https://bugzilla.suse.com/1213287", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-15T08:34:21Z", details: "moderate", }, ], title: "CVE-2023-20569", }, { cve: "CVE-2023-20593", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-20593", }, ], notes: [ { category: "general", text: "\nAn issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-20593", url: "https://www.suse.com/security/cve/CVE-2023-20593", }, { category: "external", summary: "SUSE Bug 1213286 for CVE-2023-20593", url: "https://bugzilla.suse.com/1213286", }, { category: "external", summary: "SUSE Bug 1213616 for CVE-2023-20593", url: "https://bugzilla.suse.com/1213616", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-20593", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-15T08:34:21Z", details: "moderate", }, ], title: "CVE-2023-20593", }, { cve: "CVE-2023-21400", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-21400", }, ], notes: [ { category: "general", text: "In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-21400", url: "https://www.suse.com/security/cve/CVE-2023-21400", }, { category: "external", summary: "SUSE Bug 1213272 for CVE-2023-21400", url: "https://bugzilla.suse.com/1213272", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-15T08:34:21Z", details: "moderate", }, ], title: "CVE-2023-21400", }, { cve: "CVE-2023-2156", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2156", }, ], notes: [ { category: "general", text: "A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2156", url: "https://www.suse.com/security/cve/CVE-2023-2156", }, { category: "external", summary: "SUSE Bug 1211131 for CVE-2023-2156", url: "https://bugzilla.suse.com/1211131", }, { category: "external", summary: "SUSE Bug 1211395 for CVE-2023-2156", url: "https://bugzilla.suse.com/1211395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-15T08:34:21Z", details: "important", }, ], title: "CVE-2023-2156", }, { cve: "CVE-2023-2166", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2166", }, ], notes: [ { category: "general", text: "A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2166", url: "https://www.suse.com/security/cve/CVE-2023-2166", }, { category: "external", summary: "SUSE Bug 1210627 for CVE-2023-2166", url: "https://bugzilla.suse.com/1210627", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-15T08:34:21Z", details: "moderate", }, ], title: "CVE-2023-2166", }, { cve: "CVE-2023-2985", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2985", }, ], notes: [ { category: "general", text: "A use after free flaw was found in hfsplus_put_super in fs/hfsplus/super.c in the Linux Kernel. This flaw could allow a local user to cause a denial of service problem.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2985", url: "https://www.suse.com/security/cve/CVE-2023-2985", }, { category: "external", summary: "SUSE Bug 1211867 for CVE-2023-2985", url: "https://bugzilla.suse.com/1211867", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-15T08:34:21Z", details: "moderate", }, ], title: "CVE-2023-2985", }, { cve: "CVE-2023-31083", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-31083", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu->proto is set. A NULL pointer dereference may occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-31083", url: "https://www.suse.com/security/cve/CVE-2023-31083", }, { category: "external", summary: "SUSE Bug 1210780 for CVE-2023-31083", url: "https://bugzilla.suse.com/1210780", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-15T08:34:21Z", details: "moderate", }, ], title: "CVE-2023-31083", }, { cve: "CVE-2023-3117", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3117", }, ], notes: [ { category: "general", text: "** REJECT ** Duplicate of CVE-2023-3390.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3117", url: "https://www.suse.com/security/cve/CVE-2023-3117", }, { category: "external", summary: "SUSE Bug 1212934 for CVE-2023-3117", url: "https://bugzilla.suse.com/1212934", }, { category: "external", summary: "SUSE Bug 1213245 for CVE-2023-3117", url: "https://bugzilla.suse.com/1213245", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-15T08:34:21Z", details: "important", }, ], title: "CVE-2023-3117", }, { cve: "CVE-2023-31248", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-31248", }, ], notes: [ { category: "general", text: "Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-31248", url: "https://www.suse.com/security/cve/CVE-2023-31248", }, { category: "external", summary: "SUSE Bug 1213061 for CVE-2023-31248", url: "https://bugzilla.suse.com/1213061", }, { category: "external", summary: "SUSE Bug 1213064 for CVE-2023-31248", url: "https://bugzilla.suse.com/1213064", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-15T08:34:21Z", details: "important", }, ], title: "CVE-2023-31248", }, { cve: "CVE-2023-3268", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3268", }, ], notes: [ { category: "general", text: "An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3268", url: "https://www.suse.com/security/cve/CVE-2023-3268", }, { category: "external", summary: "SUSE Bug 1212502 for CVE-2023-3268", url: "https://bugzilla.suse.com/1212502", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-3268", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-15T08:34:21Z", details: "moderate", }, ], title: "CVE-2023-3268", }, { cve: "CVE-2023-3390", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3390", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c.\n\nMishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.\n\nWe recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3390", url: "https://www.suse.com/security/cve/CVE-2023-3390", }, { category: "external", summary: "SUSE Bug 1212846 for CVE-2023-3390", url: "https://bugzilla.suse.com/1212846", }, { category: "external", summary: "SUSE Bug 1212934 for CVE-2023-3390", url: "https://bugzilla.suse.com/1212934", }, { category: "external", summary: "SUSE Bug 1216225 for CVE-2023-3390", url: "https://bugzilla.suse.com/1216225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-15T08:34:21Z", details: "important", }, ], title: "CVE-2023-3390", }, { cve: "CVE-2023-35001", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-35001", }, ], notes: [ { category: "general", text: "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-35001", url: "https://www.suse.com/security/cve/CVE-2023-35001", }, { category: "external", summary: "SUSE Bug 1213059 for CVE-2023-35001", url: "https://bugzilla.suse.com/1213059", }, { category: "external", summary: "SUSE Bug 1213063 for CVE-2023-35001", url: "https://bugzilla.suse.com/1213063", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-35001", url: "https://bugzilla.suse.com/1217531", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-15T08:34:21Z", details: "important", }, ], title: "CVE-2023-35001", }, { cve: "CVE-2023-3567", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3567", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3567", url: "https://www.suse.com/security/cve/CVE-2023-3567", }, { category: "external", summary: "SUSE Bug 1213167 for CVE-2023-3567", url: "https://bugzilla.suse.com/1213167", }, { category: "external", summary: "SUSE Bug 1213244 for CVE-2023-3567", url: "https://bugzilla.suse.com/1213244", }, { category: "external", summary: "SUSE Bug 1213842 for CVE-2023-3567", url: "https://bugzilla.suse.com/1213842", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-3567", url: "https://bugzilla.suse.com/1215674", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3567", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3567", url: "https://bugzilla.suse.com/1217531", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-15T08:34:21Z", details: "important", }, ], title: "CVE-2023-3567", }, { cve: "CVE-2023-3609", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3609", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3609", url: "https://www.suse.com/security/cve/CVE-2023-3609", }, { category: "external", summary: "SUSE Bug 1213586 for CVE-2023-3609", url: "https://bugzilla.suse.com/1213586", }, { category: "external", summary: "SUSE Bug 1213587 for CVE-2023-3609", url: "https://bugzilla.suse.com/1213587", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3609", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3609", url: "https://bugzilla.suse.com/1217531", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-15T08:34:21Z", details: "moderate", }, ], title: "CVE-2023-3609", }, { cve: "CVE-2023-3611", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3611", }, ], notes: [ { category: "general", text: "An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.\n\nWe recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3611", url: "https://www.suse.com/security/cve/CVE-2023-3611", }, { category: "external", summary: "SUSE Bug 1213585 for CVE-2023-3611", url: "https://bugzilla.suse.com/1213585", }, { category: "external", summary: "SUSE Bug 1223091 for CVE-2023-3611", url: "https://bugzilla.suse.com/1223091", }, { category: "external", summary: "SUSE Bug 1223973 for CVE-2023-3611", url: "https://bugzilla.suse.com/1223973", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-15T08:34:21Z", details: "moderate", }, ], title: "CVE-2023-3611", }, { cve: "CVE-2023-3776", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3776", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3776", url: "https://www.suse.com/security/cve/CVE-2023-3776", }, { category: "external", summary: "SUSE Bug 1213588 for CVE-2023-3776", url: "https://bugzilla.suse.com/1213588", }, { category: "external", summary: "SUSE Bug 1215119 for CVE-2023-3776", url: "https://bugzilla.suse.com/1215119", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-3776", url: "https://bugzilla.suse.com/1215674", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3776", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3776", url: "https://bugzilla.suse.com/1217531", }, { category: "external", summary: "SUSE Bug 1221578 for CVE-2023-3776", url: "https://bugzilla.suse.com/1221578", }, { category: "external", summary: "SUSE Bug 1221598 for CVE-2023-3776", url: "https://bugzilla.suse.com/1221598", }, { category: "external", summary: "SUSE Bug 1223091 for CVE-2023-3776", url: "https://bugzilla.suse.com/1223091", }, { category: "external", summary: "SUSE Bug 1223973 for CVE-2023-3776", url: "https://bugzilla.suse.com/1223973", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-15T08:34:21Z", details: "moderate", }, ], title: "CVE-2023-3776", }, { cve: "CVE-2023-3812", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3812", }, ], notes: [ { category: "general", text: "An out-of-bounds memory access flaw was found in the Linux kernel's TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3812", url: "https://www.suse.com/security/cve/CVE-2023-3812", }, { category: "external", summary: "SUSE Bug 1213543 for CVE-2023-3812", url: "https://bugzilla.suse.com/1213543", }, { category: "external", summary: "SUSE Bug 1213706 for CVE-2023-3812", url: "https://bugzilla.suse.com/1213706", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3812", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3812", url: "https://bugzilla.suse.com/1217531", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-15T08:34:21Z", details: "important", }, ], title: "CVE-2023-3812", }, { cve: "CVE-2023-4004", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4004", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4004", url: "https://www.suse.com/security/cve/CVE-2023-4004", }, { category: "external", summary: "SUSE Bug 1213812 for CVE-2023-4004", url: "https://bugzilla.suse.com/1213812", }, { category: "external", summary: "SUSE Bug 1214812 for CVE-2023-4004", url: "https://bugzilla.suse.com/1214812", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_46-rt-1-150400.1.5.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "SUSE Real Time Module 15 SP4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "SUSE Real Time Module 15 SP4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-devel-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-rt_debug-devel-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:kernel-source-rt-5.14.21-150400.15.46.1.noarch", "openSUSE Leap 15.4:kernel-syms-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.3:kernel-rt-5.14.21-150400.15.46.1.x86_64", "openSUSE Leap Micro 5.4:kernel-rt-5.14.21-150400.15.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-15T08:34:21Z", details: "important", }, ], title: "CVE-2023-4004", }, ], }
suse-su-2023:3311-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2022-40982: Fixed transient execution attack called 'Gather Data Sampling' (bsc#1206418).\n- CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec (bsc#1211738).\n- CVE-2023-20569: Fixed side channel attack ‘Inception’ or ‘RAS Poisoning’ (bsc#1213287).\n- CVE-2023-21400: Fixed several memory corruptions due to improper locking in io_uring (bsc#1213272).\n- CVE-2023-2156: Fixed a flaw in the networking subsystem within the handling of the RPL protocol (bsc#1211131).\n- CVE-2023-2166: Fixed NULL pointer dereference in can_rcv_filter (bsc#1210627).\n- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).\n- CVE-2023-3268: Fixed an out of bounds memory access flaw in relay_file_read_start_pos in the relayfs (bsc#1212502).\n- CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c (bsc#1213167).\n- CVE-2023-3609: Fixed reference counter leak leading to overflow in net/sched (bsc#1213586).\n- CVE-2023-3611: Fixed an out-of-bounds write in net/sched sch_qfq(bsc#1213585).\n- CVE-2023-3776: Fixed improper refcount update in cls_fw leads to use-after-free (bsc#1213588).\n- CVE-2023-38409: Fixed an issue in set_con2fb_map in drivers/video/fbdev/core/fbcon.c. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info) (bsc#1213417).\n- CVE-2023-3863: Fixed a use-after-free flaw in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC. This flaw allowed a local user with special privileges to impact a kernel information leak issue (bsc#1213601).\n- CVE-2023-4004: Fixed improper element removal netfilter nft_set_pipapo (bsc#1213812).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Add ACPI disabled check to acpi_cpc_valid() (bsc#1212445).\n- ACPI: CPPC: Add definition for undefined FADT preferred PM profile value (bsc#1212445).\n- ACPI/IORT: Remove erroneous id_count check in iort_node_get_rmr_info() (git-fixes).\n- ACPI: utils: Fix acpi_evaluate_dsm_typed() redefinition error (git-fixes).\n- afs: Adjust ACK interpretation to try and cope with NAT (git-fixes).\n- afs: Fix access after dec in put functions (git-fixes).\n- afs: Fix afs_getattr() to refetch file status if callback break occurred (git-fixes).\n- afs: Fix dynamic root getattr (git-fixes).\n- afs: Fix fileserver probe RTT handling (git-fixes).\n- afs: Fix infinite loop found by xfstest generic/676 (git-fixes).\n- afs: Fix lost servers_outstanding count (git-fixes).\n- afs: Fix server->active leak in afs_put_server (git-fixes).\n- afs: Fix setting of mtime when creating a file/dir/symlink (git-fixes).\n- afs: Fix updating of i_size with dv jump from server (git-fixes).\n- afs: Fix vlserver probe RTT handling (git-fixes).\n- afs: Return -EAGAIN, not -EREMOTEIO, when a file already locked (git-fixes).\n- afs: Use refcount_t rather than atomic_t (git-fixes).\n- afs: Use the operation issue time instead of the reply time for callbacks (git-fixes).\n- ALSA: emu10k1: roll up loops in DSP setup code for Audigy (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NS70AU (git-fixes).\n- ALSA: hda/realtek: Add support for DELL Oasis 13/14/16 laptops (git-fixes).\n- ALSA: hda/realtek: Enable Mute LED on HP Laptop 15s-eq2xxx (git-fixes).\n- ALSA: hda/realtek: Fix generic fixup definition for cs35l41 amp (git-fixes).\n- ALSA: hda/realtek - remove 3k pull low procedure (git-fixes).\n- ALSA: hda/realtek: Support ASUS G713PV laptop (git-fixes).\n- ALSA: hda/relatek: Enable Mute LED on HP 250 G8 (git-fixes).\n- ALSA: usb-audio: Add FIXED_RATE quirk for JBL Quantum610 Wireless (git-fixes).\n- ALSA: usb-audio: Add new quirk FIXED_RATE for JBL Quantum810 Wireless (git-fixes).\n- ALSA: usb-audio: Add quirk for Microsoft Modern Wireless Headset (bsc#1207129).\n- ALSA: usb-audio: Always initialize fixed_rate in snd_usb_find_implicit_fb_sync_format() (git-fixes).\n- ALSA: usb-audio: Apply mutex around snd_usb_endpoint_set_params() (git-fixes).\n- ALSA: usb-audio: Avoid superfluous endpoint setup (git-fixes).\n- ALSA: usb-audio: Avoid unnecessary interface change at EP close (git-fixes).\n- ALSA: usb-audio: Clear fixed clock rate at closing EP (git-fixes).\n- ALSA: usb-audio: Correct the return code from snd_usb_endpoint_set_params() (git-fixes).\n- ALSA: usb-audio: Drop superfluous interface setup at parsing (git-fixes).\n- ALSA: usb-audio: Fix possible NULL pointer dereference in snd_usb_pcm_has_fixed_rate() (git-fixes).\n- ALSA: usb-audio: Fix wrong kfree issue in snd_usb_endpoint_free_all (git-fixes).\n- ALSA: usb-audio: More refactoring of hw constraint rules (git-fixes).\n- ALSA: usb-audio: Properly refcounting clock rate (git-fixes).\n- ALSA: usb-audio: Rate limit usb_set_interface error reporting (git-fixes).\n- ALSA: usb-audio: Refcount multiple accesses on the single clock (git-fixes).\n- ALSA: usb-audio: Split endpoint setups for hw_params and prepare (take#2) (git-fixes).\n- ALSA: usb-audio: Update for native DSD support quirks (git-fixes).\n- ALSA: usb-audio: Use atomic_try_cmpxchg in ep_state_update (git-fixes).\n- ALSA: usb-audio: Workaround for XRUN at prepare (git-fixes).\n- amd-pstate: Fix amd_pstate mode switch (git-fixes).\n- ASoC: amd: acp: fix for invalid dai id handling in acp_get_byte_count() (git-fixes).\n- ASoC: atmel: Fix the 8K sample parameter in I2SC master (git-fixes).\n- ASoc: codecs: ES8316: Fix DMIC config (git-fixes).\n- ASoC: codecs: wcd934x: fix resource leaks on component remove (git-fixes).\n- ASoC: codecs: wcd938x: fix codec initialisation race (git-fixes).\n- ASoC: codecs: wcd938x: fix dB range for HPHL and HPHR (git-fixes).\n- ASoC: codecs: wcd938x: fix missing clsh ctrl error handling (git-fixes).\n- ASoC: codecs: wcd938x: fix soundwire initialisation race (git-fixes).\n- ASoC: codecs: wcd-mbhc-v2: fix resource leaks on component remove (git-fixes).\n- ASoC: da7219: Check for failure reading AAD IRQ events (git-fixes).\n- ASoC: da7219: Flush pending AAD IRQ when suspending (git-fixes).\n- ASoC: fsl_sai: Disable bit clock with transmitter (git-fixes).\n- ASoC: fsl_spdif: Silence output on stop (git-fixes).\n- ASoC: rt5640: Fix sleep in atomic context (git-fixes).\n- ASoC: rt5682-sdw: fix for JD event handling in ClockStop Mode0 (git-fixes).\n- ASoC: rt711: fix for JD event handling in ClockStop Mode0 (git-fixes).\n- ASoC: rt711-sdca: fix for JD event handling in ClockStop Mode0 (git-fixes).\n- ASoC: SOF: ipc3-dtrace: uninitialized data in dfsentry_trace_filter_write() (git-fixes).\n- ASoC: tegra: Fix ADX byte map (git-fixes).\n- ASoC: tegra: Fix AMX byte map (git-fixes).\n- ASoC: wm8904: Fill the cache for WM8904_ADC_TEST_0 register (git-fixes).\n- ata: pata_ns87415: mark ns87560_tf_read static (git-fixes).\n- block, bfq: Fix division by zero error on zero wsum (bsc#1213653).\n- block: Fix a source code comment in include/uapi/linux/blkzoned.h (git-fixes).\n- bus: mhi: add new interfaces to handle MHI channels directly (bsc#1207948).\n- bus: mhi: host: add destroy_device argument to mhi_power_down() (bsc#1207948).\n- can: gs_usb: gs_can_close(): add missing set of CAN state to CAN_STATE_STOPPED (git-fixes).\n- ceph: do not let check_caps skip sending responses for revoke msgs (bsc#1213856).\n- coda: Avoid partial allocation of sig_inputArgs (git-fixes).\n- cpufreq: amd-pstate: add amd-pstate driver parameter for mode selection (bsc#1212445).\n- cpufreq: amd-pstate: Add AMD P-State frequencies attributes (bsc#1212445).\n- cpufreq: amd-pstate: Add AMD P-State performance attributes (bsc#1212445).\n- cpufreq: amd-pstate: Add boost mode support for AMD P-State (bsc#1212445).\n- cpufreq: amd-pstate: add driver working mode switch support (bsc#1212445).\n- cpufreq: amd-pstate: Add ->fast_switch() callback (bsc#1212445).\n- cpufreq: amd-pstate: Add fast switch function for AMD P-State (bsc#1212445).\n- cpufreq: amd-pstate: Add guided autonomous mode (bsc#1212445).\n- cpufreq: amd-pstate: Add guided mode control support via sysfs (bsc#1212445).\n- cpufreq: amd-pstate: Add more tracepoint for AMD P-State module (bsc#1212445).\n- cpufreq: amd-pstate: Add resume and suspend callbacks (bsc#1212445).\n- cpufreq: amd-pstate: Add trace for AMD P-State module (bsc#1212445).\n- cpufreq: amd-pstate: avoid uninitialized variable use (bsc#1212445).\n- cpufreq: amd-pstate: change amd-pstate driver to be built-in type (bsc#1212445).\n- cpufreq: amd-pstate: convert sprintf with sysfs_emit() (bsc#1212445).\n- cpufreq: amd-pstate: cpufreq: amd-pstate: reset MSR_AMD_PERF_CTL register at init (bsc#1212445).\n- cpufreq: amd-pstate: Expose struct amd_cpudata (bsc#1212445).\n- cpufreq: amd-pstate: Fix initial highest_perf value (bsc#1212445).\n- cpufreq: amd-pstate: Fix invalid write to MSR_AMD_CPPC_REQ (bsc#1212445).\n- cpufreq: amd-pstate: Fix Kconfig dependencies for AMD P-State (bsc#1212445).\n- cpufreq: amd-pstate: fix kernel hang issue while amd-pstate unregistering (bsc#1212445).\n- cpufreq: amd-pstate: Fix struct amd_cpudata kernel-doc comment (bsc#1212445).\n- cpufreq: amd-pstate: fix white-space (bsc#1212445).\n- cpufreq: amd_pstate: fix wrong lowest perf fetch (bsc#1212445).\n- cpufreq: amd-pstate: implement amd pstate cpu online and offline callback (bsc#1212445).\n- cpufreq: amd-pstate: implement Pstate EPP support for the AMD processors (bsc#1212445).\n- cpufreq: amd-pstate: implement suspend and resume callbacks (bsc#1212445).\n- cpufreq: amd-pstate: Introduce a new AMD P-State driver to support future processors (bsc#1212445).\n- cpufreq: amd-pstate: Introduce the support for the processors with shared memory solution (bsc#1212445).\n- cpufreq: amd-pstate: Let user know amd-pstate is disabled (bsc#1212445).\n- cpufreq: amd-pstate: Make amd-pstate EPP driver name hyphenated (bsc#1212445).\n- cpufreq: amd-pstate: Make varaiable mode_state_machine static (bsc#1212445).\n- cpufreq: amd_pstate: map desired perf into pstate scope for powersave governor (bsc#1212445).\n- cpufreq: amd-pstate: optimize driver working mode selection in amd_pstate_param() (bsc#1212445).\n- cpufreq: amd-pstate: Remove fast_switch_possible flag from active driver (bsc#1212445).\n- cpufreq: amd-pstate: remove MODULE_LICENSE in non-modules (bsc#1212445).\n- cpufreq: amd-pstate: Set a fallback policy based on preferred_profile (bsc#1212445).\n- cpufreq: amd-pstate: simplify cpudata pointer assignment (bsc#1212445).\n- cpufreq: amd-pstate: Update policy->cur in amd_pstate_adjust_perf() (bsc#1212445).\n- cpufreq: amd-pstate: update pstate frequency transition delay time (bsc#1212445).\n- cpufreq: amd-pstate: Write CPPC enable bit per-socket (bsc#1212445).\n- crypto: kpp - Add helper to set reqsize (git-fixes).\n- crypto: qat - Use helper to set reqsize (git-fixes).\n- dlm: fix missing lkb refcount handling (git-fixes).\n- dlm: fix plock invalid read (git-fixes).\n- Documentation: cpufreq: amd-pstate: Move amd_pstate param to alphabetical order (bsc#1212445).\n- Documentation: devices.txt: reconcile serial/ucc_uart minor numers (git-fixes).\n- drm/amd/display: Add monitor specific edid quirk (git-fixes).\n- drm/amd/display: Add polling method to handle MST reply packet (bsc#1213578).\n- drm/amd/display: check TG is non-null before checking if enabled (git-fixes).\n- drm/amd/display: Correct `DMUB_FW_VERSION` macro (git-fixes).\n- drm/amd/display: Disable MPC split by default on special asic (git-fixes).\n- drm/amd/display: fix access hdcp_workqueue assert (git-fixes).\n- drm/amd/display: fix seamless odm transitions (git-fixes).\n- drm/amd/display: Keep PHY active for DP displays on DCN31 (git-fixes).\n- drm/amd/display: only accept async flips for fast updates (git-fixes).\n- drm/amd/display: Only update link settings after successful MST link train (git-fixes).\n- drm/amd/display: phase3 mst hdcp for multiple displays (git-fixes).\n- drm/amd/display: Remove Phantom Pipe Check When Calculating K1 and K2 (git-fixes).\n- drm/amd/display: save restore hdcp state when display is unplugged from mst hub (git-fixes).\n- drm/amd/display: Unlock on error path in dm_handle_mst_sideband_msg_ready_event() (git-fixes).\n- drm/amd: Fix an error handling mistake in psp_sw_init() (git-fixes).\n- drm/amdgpu: add the fan abnormal detection feature (git-fixes).\n- drm/amdgpu: avoid restore process run into dead loop (git-fixes).\n- drm/amdgpu: fix clearing mappings for BOs that are always valid in VM (git-fixes).\n- drm/amdgpu: Fix minmax warning (git-fixes).\n- drm/amd/pm: add abnormal fan detection for smu 13.0.0 (git-fixes).\n- drm/amd/pm: conditionally disable pcie lane/speed switching for SMU13 (git-fixes).\n- drm/amd/pm: re-enable the gfx imu when smu resume (git-fixes).\n- drm/amd/pm: share the code around SMU13 pcie parameters update (git-fixes).\n- drm/atomic: Allow vblank-enabled + self-refresh 'disable' (git-fixes).\n- drm/atomic: Fix potential use-after-free in nonblocking commits (git-fixes).\n- drm/bridge: tc358768: Add atomic_get_input_bus_fmts() implementation (git-fixes).\n- drm/bridge: tc358768: fix TCLK_TRAILCNT computation (git-fixes).\n- drm/bridge: tc358768: fix THS_TRAILCNT computation (git-fixes).\n- drm/bridge: tc358768: fix THS_ZEROCNT computation (git-fixes).\n- drm/bridge: ti-sn65dsi86: Fix auxiliary bus lifetime (git-fixes).\n- drm/client: Fix memory leak in drm_client_modeset_probe (git-fixes).\n- drm/dp_mst: Clear MSG_RDY flag before sending new message (bsc#1213578).\n- drm: Fix null pointer dereference in drm_dp_atomic_find_time_slots() (bsc#1213578).\n- drm/i915: Do not preserve dpll_hw_state for slave crtc in Bigjoiner (git-fixes).\n- drm/i915/dpt: Use shmem for dpt objects (git-fixes).\n- drm/i915: Fix an error handling path in igt_write_huge() (git-fixes).\n- drm/i915/tc: Fix system resume MST mode restore for DP-alt sinks (git-fixes).\n- drm/msm/adreno: Fix snapshot BINDLESS_DATA size (git-fixes).\n- drm/msm/disp/dpu: get timing engine status from intf status register (git-fixes).\n- drm/msm/dpu: drop enum dpu_core_perf_data_bus_id (git-fixes).\n- drm/msm/dpu: Set DPU_DATA_HCTL_EN for in INTF_SC7180_MASK (git-fixes).\n- drm/msm: Fix IS_ERR_OR_NULL() vs NULL check in a5xx_submit_in_rb() (git-fixes).\n- drm/radeon: Fix integer overflow in radeon_cs_parser_init (git-fixes).\n- drm/ttm: fix bulk_move corruption when adding a entry (git-fixes).\n- drm/ttm: fix warning that we shouldn't mix && and || (git-fixes).\n- drm/vmwgfx: Fix Legacy Display Unit atomic drm support (bsc#1213632).\n- drm/vmwgfx: Remove explicit and broken vblank handling (bsc#1213632).\n- drm/vmwgfx: Remove rcu locks from user resources (bsc#1213632).\n- fbdev: au1200fb: Fix missing IRQ check in au1200fb_drv_probe (git-fixes).\n- fbdev: imxfb: Removed unneeded release_mem_region (git-fixes).\n- fbdev: imxfb: warn about invalid left/right margin (git-fixes).\n- file: always lock position for FMODE_ATOMIC_POS (bsc#1213759).\n- fs: dlm: add midcomms init/start functions (git-fixes).\n- fs: dlm: do not set stop rx flag after node reset (git-fixes).\n- fs: dlm: filter user dlm messages for kernel locks (git-fixes).\n- fs: dlm: fix log of lowcomms vs midcomms (git-fixes).\n- fs: dlm: fix race between test_bit() and queue_work() (git-fixes).\n- fs: dlm: fix race in lowcomms (git-fixes).\n- fs: dlm: handle -EBUSY first in lock arg validation (git-fixes).\n- fs: dlm: move sending fin message into state change handling (git-fixes).\n- fs: dlm: retry accept() until -EAGAIN or error returns (git-fixes).\n- fs: dlm: return positive pid value for F_GETLK (git-fixes).\n- fs: dlm: start midcomms before scand (git-fixes).\n- fs: hfsplus: remove WARN_ON() from hfsplus_cat_{read,write}_inode() (git-fixes).\n- FS: JFS: Check for read-only mounted filesystem in txBegin (git-fixes).\n- FS: JFS: Fix null-ptr-deref Read in txBegin (git-fixes).\n- fs: jfs: Fix UBSAN: array-index-out-of-bounds in dbAllocDmapLev (git-fixes).\n- gve: Set default duplex configuration to full (git-fixes).\n- gve: unify driver name usage (git-fixes).\n- hwmon: (adm1275) Allow setting sample averaging (git-fixes).\n- hwmon: (k10temp) Enable AMD3255 Proc to show negative temperature (git-fixes).\n- hwmon: (nct7802) Fix for temp6 (PECI1) processed even if PECI1 disabled (git-fixes).\n- hwmon: (pmbus/adm1275) Fix problems with temperature monitoring on ADM1272 (git-fixes).\n- i2c: xiic: Defer xiic_wakeup() and __xiic_start_xfer() in xiic_process() (git-fixes).\n- i2c: xiic: Do not try to handle more interrupt events after error (git-fixes).\n- iavf: check for removal state before IAVF_FLAG_PF_COMMS_FAILED (git-fixes).\n- iavf: fix a deadlock caused by rtnl and driver's lock circular dependencies (git-fixes).\n- iavf: Fix out-of-bounds when setting channels on remove (git-fixes).\n- iavf: fix potential deadlock on allocation failure (git-fixes).\n- iavf: fix reset task race with iavf_remove() (git-fixes).\n- iavf: Fix use-after-free in free_netdev (git-fixes).\n- iavf: Move netdev_update_features() into watchdog task (git-fixes).\n- iavf: use internal state to free traffic IRQs (git-fixes).\n- iavf: Wait for reset in callbacks which trigger it (git-fixes).\n- IB/hfi1: Use bitmap_zalloc() when applicable (git-fixes)\n- ice: Fix max_rate check while configuring TX rate limits (git-fixes).\n- ice: Fix memory management in ice_ethtool_fdir.c (git-fixes).\n- ice: handle extts in the miscellaneous interrupt thread (git-fixes).\n- igc: Check if hardware TX timestamping is enabled earlier (git-fixes).\n- igc: Enable and fix RX hash usage by netstack (git-fixes).\n- igc: Fix inserting of empty frame for launchtime (git-fixes).\n- igc: Fix Kernel Panic during ndo_tx_timeout callback (git-fixes).\n- igc: Fix launchtime before start of cycle (git-fixes).\n- igc: Fix race condition in PTP tx code (git-fixes).\n- igc: Handle PPS start time programming for past time values (git-fixes).\n- igc: Prevent garbled TX queue with XDP ZEROCOPY (git-fixes).\n- igc: Remove delay during TX ring configuration (git-fixes).\n- igc: set TP bit in 'supported' and 'advertising' fields of ethtool_link_ksettings (git-fixes).\n- igc: Work around HW bug causing missing timestamps (git-fixes).\n- Input: i8042 - add Clevo PCX0DX to i8042 quirk table (git-fixes).\n- Input: iqs269a - do not poll during ATI (git-fixes).\n- Input: iqs269a - do not poll during suspend or resume (git-fixes).\n- jffs2: fix memory leak in jffs2_do_fill_super (git-fixes).\n- jffs2: fix memory leak in jffs2_do_mount_fs (git-fixes).\n- jffs2: fix memory leak in jffs2_scan_medium (git-fixes).\n- jffs2: fix use-after-free in jffs2_clear_xattr_subsystem (git-fixes).\n- jffs2: GC deadlock reading a page that is used in jffs2_write_begin() (git-fixes).\n- jffs2: reduce stack usage in jffs2_build_xattr_subsystem() (git-fixes).\n- jfs: jfs_dmap: Validate db_l2nbperpage while mounting (git-fixes).\n- kABI fix after Restore kABI for NVidia vGPU driver (bsc#1210825).\n- kabi/severities: relax kABI for ath11k local symbols (bsc#1207948)\n- kselftest: vDSO: Fix accumulation of uninitialized ret when CLOCK_REALTIME is undefined (git-fixes).\n- KVM: arm64: Do not read a HW interrupt pending state in user context (git-fixes)\n- KVM: arm64: Warn if accessing timer pending state outside of vcpu (bsc#1213620)\n- KVM: Do not null dereference ops->destroy (git-fixes)\n- KVM: downgrade two BUG_ONs to WARN_ON_ONCE (git-fixes)\n- KVM: Initialize debugfs_dentry when a VM is created to avoid NULL (git-fixes)\n- KVM: s390: pv: fix index value of replaced ASCE (git-fixes bsc#1213867).\n- KVM: VMX: Inject #GP, not #UD, if SGX2 ENCLS leafs are unsupported (git-fixes).\n- KVM: VMX: Inject #GP on ENCLS if vCPU has paging disabled (CR0.PG==0) (git-fixes).\n- KVM: VMX: restore vmx_vmexit alignment (git-fixes).\n- KVM: x86: Account fastpath-only VM-Exits in vCPU stats (git-fixes).\n- leds: trigger: netdev: Recheck NETDEV_LED_MODE_LINKUP on dev rename (git-fixes).\n- libceph: harden msgr2.1 frame segment length checks (bsc#1213857).\n- MAINTAINERS: Add AMD P-State driver maintainer entry (bsc#1212445).\n- m ALSA: usb-audio: Add quirk for Tascam Model 12 (git-fixes).\n- md: add error_handlers for raid0 and linear (bsc#1212766).\n- media: staging: atomisp: select V4L2_FWNODE (git-fixes).\n- mhi_power_down() kABI workaround (bsc#1207948).\n- mmc: core: disable TRIM on Kingston EMMC04G-M627 (git-fixes).\n- mmc: sdhci: fix DMA configure compatibility issue when 64bit DMA mode is used (git-fixes).\n- net: ena: fix shift-out-of-bounds in exponential backoff (git-fixes).\n- net: mana: Batch ringing RX queue doorbell on receiving packets (bsc#1212901).\n- net: mana: Use the correct WQE count for ringing RQ doorbell (bsc#1212901).\n- net/mlx5: DR, Support SW created encap actions for FW table (git-fixes).\n- net/mlx5e: Check for NOT_READY flag state after locking (git-fixes).\n- net/mlx5e: fix double free in mlx5e_destroy_flow_table (git-fixes).\n- net/mlx5e: fix memory leak in mlx5e_fs_tt_redirect_any_create (git-fixes).\n- net/mlx5e: fix memory leak in mlx5e_ptp_open (git-fixes).\n- net/mlx5e: XDP, Allow growing tail for XDP multi buffer (git-fixes).\n- net/mlx5e: xsk: Set napi_id to support busy polling on XSK RQ (git-fixes).\n- net: phy: marvell10g: fix 88x3310 power up (git-fixes).\n- net/sched: sch_qfq: refactor parsing of netlink parameters (bsc#1213585).\n- net/sched: sch_qfq: reintroduce lmax bound check for MTU (bsc#1213585).\n- nfsd: add encoding of op_recall flag for write delegation (git-fixes).\n- nfsd: fix double fget() bug in __write_ports_addfd() (git-fixes).\n- nfsd: Fix sparse warning (git-fixes).\n- nfsd: Remove open coding of string copy (git-fixes).\n- nfsv4.1: Always send a RECLAIM_COMPLETE after establishing lease (git-fixes).\n- nfsv4.1: freeze the session table upon receiving NFS4ERR_BADSESSION (git-fixes).\n- nvme: do not reject probe due to duplicate IDs for single-ported PCIe devices (git-fixes).\n- nvme: fix the NVME_ID_NS_NVM_STS_MASK definition (git-fixes).\n- nvme-pci: fix DMA direction of unmapping integrity data (git-fixes).\n- nvme-pci: remove nvme_queue from nvme_iod (git-fixes).\n- octeontx2-af: Move validation of ptp pointer before its usage (git-fixes).\n- octeontx2-pf: Add additional check for MCAM rules (git-fixes).\n- octeontx-af: fix hardware timestamp configuration (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 88SE9235 (git-fixes).\n- PCI/PM: Avoid putting EloPOS E2/S2/H2 PCIe Ports in D3cold (git-fixes).\n- phy: hisilicon: Fix an out of bounds check in hisi_inno_phy_probe() (git-fixes).\n- pinctrl: amd: Detect internal GPIO0 debounce handling (git-fixes).\n- pinctrl: amd: Do not show `Invalid config param` errors (git-fixes).\n- pinctrl: amd: Fix mistake in handling clearing pins at startup (git-fixes).\n- pinctrl: amd: Only use special debounce behavior for GPIO 0 (git-fixes).\n- pinctrl: amd: Use amd_pinconf_set() for all config options (git-fixes).\n- platform/x86: msi-laptop: Fix rfkill out-of-sync on MSI Wind U100 (git-fixes).\n- RDMA/bnxt_re: Fix hang during driver unload (git-fixes)\n- RDMA/bnxt_re: Prevent handling any completions after qp destroy (git-fixes)\n- RDMA/core: Update CMA destination address on rdma_resolve_addr (git-fixes)\n- RDMA/irdma: Add missing read barriers (git-fixes)\n- RDMA/irdma: Fix data race on CQP completion stats (git-fixes)\n- RDMA/irdma: Fix data race on CQP request done (git-fixes)\n- RDMA/irdma: Fix op_type reporting in CQEs (git-fixes)\n- RDMA/irdma: Report correct WC error (git-fixes)\n- RDMA/mlx4: Make check for invalid flags stricter (git-fixes)\n- RDMA/mthca: Fix crash when polling CQ for shared QPs (git-fixes)\n- regmap: Account for register length in SMBus I/O limits (git-fixes).\n- regmap: Drop initial version of maximum transfer length fixes (git-fixes).\n- Restore kABI for NVidia vGPU driver (bsc#1210825).\n- Revert 'ALSA: usb-audio: Drop superfluous interface setup at parsing' (git-fixes).\n- Revert 'debugfs, coccinelle: check for obsolete DEFINE_SIMPLE_ATTRIBUTE() usage' (git-fixes).\n- Revert 'Drop AMDGPU patches for fixing regression (bsc#1213304,bsc#1213777)' \n- Revert 'iavf: Detach device during reset task' (git-fixes).\n- Revert 'iavf: Do not restart Tx queues after reset task failure' (git-fixes).\n- Revert 'NFSv4: Retry LOCK on OLD_STATEID during delegation return' (git-fixes).\n- Revert 'usb: dwc3: core: Enable AutoRetry feature in the controller' (git-fixes).\n- Revert 'usb: gadget: tegra-xudc: Fix error check in tegra_xudc_powerdomain_init()' (git-fixes).\n- Revert 'usb: xhci: tegra: Fix error check' (git-fixes).\n- Revert 'xhci: add quirk for host controllers that do not update endpoint DCS' (git-fixes).\n- Revive drm_dp_mst_hpd_irq() function (bsc#1213578).\n- rxrpc, afs: Fix selection of abort codes (git-fixes).\n- s390/bpf: Add expoline to tail calls (git-fixes bsc#1213870).\n- s390/dasd: fix hanging device after quiesce/resume (git-fixes bsc#1213810).\n- s390/dasd: print copy pair message only for the correct error (git-fixes bsc#1213872).\n- s390/decompressor: specify __decompress() buf len to avoid overflow (git-fixes bsc#1213863).\n- s390: introduce nospec_uses_trampoline() (git-fixes bsc#1213870).\n- s390/ipl: add missing intersection check to ipl_report handling (git-fixes bsc#1213871).\n- s390/qeth: Fix vipa deletion (git-fixes bsc#1213713).\n- s390/vmem: fix empty page tables cleanup under KASAN (git-fixes bsc#1213715).\n- scftorture: Count reschedule IPIs (git-fixes).\n- scsi: lpfc: Abort outstanding ELS cmds when mailbox timeout error is detected (bsc#1213756).\n- scsi: lpfc: Avoid -Wstringop-overflow warning (bsc#1213756).\n- scsi: lpfc: Clean up SLI-4 sysfs resource reporting (bsc#1213756).\n- scsi: lpfc: Copyright updates for 14.2.0.14 patches (bsc#1213756).\n- scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() (bsc#1213756).\n- scsi: lpfc: Fix incorrect big endian type assignment in bsg loopback path (bsc#1213756).\n- scsi: lpfc: Fix incorrect big endian type assignments in FDMI and VMID paths (bsc#1213756).\n- scsi: lpfc: Fix lpfc_name struct packing (bsc#1213756).\n- scsi: lpfc: Make fabric zone discovery more robust when handling unsolicited LOGO (bsc#1213756).\n- scsi: lpfc: Pull out fw diagnostic dump log message from driver's trace buffer (bsc#1213756).\n- scsi: lpfc: Qualify ndlp discovery state when processing RSCN (bsc#1213756).\n- scsi: lpfc: Refactor cpu affinity assignment paths (bsc#1213756).\n- scsi: lpfc: Remove extra ndlp kref decrement in FLOGI cmpl for loop topology (bsc#1213756).\n- scsi: lpfc: Replace all non-returning strlcpy() with strscpy() (bsc#1213756).\n- scsi: lpfc: Replace one-element array with flexible-array member (bsc#1213756).\n- scsi: lpfc: Revise ndlp kref handling for dev_loss_tmo_callbk and lpfc_drop_node (bsc#1213756).\n- scsi: lpfc: Set Establish Image Pair service parameter only for Target Functions (bsc#1213756).\n- scsi: lpfc: Simplify fcp_abort transport callback log message (bsc#1213756).\n- scsi: lpfc: Update lpfc version to 14.2.0.14 (bsc#1213756).\n- scsi: lpfc: Use struct_size() helper (bsc#1213756).\n- scsi: qla2xxx: Adjust IOCB resource on qpair create (bsc#1213747).\n- scsi: qla2xxx: Array index may go out of bound (bsc#1213747).\n- scsi: qla2xxx: Avoid fcport pointer dereference (bsc#1213747).\n- scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport() (bsc#1213747).\n- scsi: qla2xxx: Correct the index of array (bsc#1213747).\n- scsi: qla2xxx: Drop useless LIST_HEAD (bsc#1213747).\n- scsi: qla2xxx: Fix buffer overrun (bsc#1213747).\n- scsi: qla2xxx: Fix command flush during TMF (bsc#1213747).\n- scsi: qla2xxx: Fix deletion race condition (bsc#1213747).\n- scsi: qla2xxx: Fix end of loop test (bsc#1213747).\n- scsi: qla2xxx: Fix erroneous link up failure (bsc#1213747).\n- scsi: qla2xxx: Fix error code in qla2x00_start_sp() (bsc#1213747).\n- scsi: qla2xxx: fix inconsistent TMF timeout (bsc#1213747).\n- scsi: qla2xxx: Fix NULL pointer dereference in target mode (bsc#1213747).\n- scsi: qla2xxx: Fix potential NULL pointer dereference (bsc#1213747).\n- scsi: qla2xxx: Fix session hang in gnl (bsc#1213747).\n- scsi: qla2xxx: Fix TMF leak through (bsc#1213747).\n- scsi: qla2xxx: Limit TMF to 8 per function (bsc#1213747).\n- scsi: qla2xxx: Pointer may be dereferenced (bsc#1213747).\n- scsi: qla2xxx: Remove unused nvme_ls_waitq wait queue (bsc#1213747).\n- scsi: qla2xxx: Replace one-element array with DECLARE_FLEX_ARRAY() helper (bsc#1213747).\n- scsi: qla2xxx: Silence a static checker warning (bsc#1213747).\n- scsi: qla2xxx: Turn off noisy message log (bsc#1213747).\n- scsi: qla2xxx: Update version to 10.02.08.400-k (bsc#1213747).\n- scsi: qla2xxx: Update version to 10.02.08.500-k (bsc#1213747).\n- scsi: qla2xxx: Use vmalloc_array() and vcalloc() (bsc#1213747).\n- selftests: rtnetlink: remove netdevsim device after ipsec offload test (git-fixes).\n- serial: qcom-geni: drop bogus runtime pm state update (git-fixes).\n- serial: sifive: Fix sifive_serial_console_setup() section (git-fixes).\n- series: udpate metadata Refresh\n- sfc: fix crash when reading stats while NIC is resetting (git-fixes).\n- sfc: fix XDP queues mode with legacy IRQ (git-fixes).\n- sfc: use budget for TX completions (git-fixes).\n- soundwire: qcom: update status correctly with mask (git-fixes).\n- staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() (git-fixes).\n- staging: r8712: Fix memory leak in _r8712_init_xmit_priv() (git-fixes).\n- SUNRPC: always free ctxt when freeing deferred request (git-fixes).\n- SUNRPC: double free xprt_ctxt while still in use (git-fixes).\n- SUNRPC: Fix trace_svc_register() call site (git-fixes).\n- SUNRPC: Fix UAF in svc_tcp_listen_data_ready() (git-fixes).\n- SUNRPC: Remove dead code in svc_tcp_release_rqst() (git-fixes).\n- SUNRPC: remove the maximum number of retries in call_bind_status (git-fixes).\n- svcrdma: Prevent page release when nothing was received (git-fixes).\n- tpm_tis: Explicitly check for error code (git-fixes).\n- tty: n_gsm: fix UAF in gsm_cleanup_mux (git-fixes).\n- tty: serial: fsl_lpuart: add earlycon for imx8ulp platform (git-fixes).\n- ubifs: Add missing iput if do_tmpfile() failed in rename whiteout (git-fixes).\n- ubifs: do_rename: Fix wrong space budget when target inode's nlink > 1 (git-fixes).\n- ubifs: Error path in ubifs_remount_rw() seems to wrongly free write buffers (git-fixes).\n- ubifs: Fix AA deadlock when setting xattr for encrypted file (git-fixes).\n- ubifs: Fix build errors as symbol undefined (git-fixes).\n- ubifs: Fix deadlock in concurrent rename whiteout and inode writeback (git-fixes).\n- ubifs: Fix memory leak in alloc_wbufs() (git-fixes).\n- ubifs: Fix memory leak in do_rename (git-fixes).\n- ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock() (git-fixes).\n- ubifs: Fix to add refcount once page is set private (git-fixes).\n- ubifs: Fix 'ui->dirty' race between do_tmpfile() and writeback work (git-fixes).\n- ubifs: Fix wrong dirty space budget for dirty inode (git-fixes).\n- ubifs: Free memory for tmpfile name (git-fixes).\n- ubifs: Rectify space amount budget for mkdir/tmpfile operations (git-fixes).\n- ubifs: Rectify space budget for ubifs_symlink() if symlink is encrypted (git-fixes).\n- ubifs: Rectify space budget for ubifs_xrename() (git-fixes).\n- ubifs: Rename whiteout atomically (git-fixes).\n- ubifs: rename_whiteout: correct old_dir size computing (git-fixes).\n- ubifs: rename_whiteout: Fix double free for whiteout_ui->data (git-fixes).\n- ubifs: Reserve one leb for each journal head while doing budget (git-fixes).\n- ubifs: Re-statistic cleaned znode count if commit failed (git-fixes).\n- ubifs: setflags: Make dirtied_ino_d 8 bytes aligned (git-fixes).\n- ubifs: ubifs_writepage: Mark page dirty after writing inode failed (git-fixes).\n- Update config files: enable CONFIG_X86_AMD_PSTATE (bsc#1212445)\n- usb: dwc2: platform: Improve error reporting for problems during .remove() (git-fixes).\n- usb: dwc3: do not reset device side if dwc3 was configured as host-only (git-fixes).\n- usb: dwc3: pci: skip BYT GPIO lookup table for hardwired phy (git-fixes).\n- usb: gadget: core: remove unbalanced mutex_unlock in usb_gadget_activate (git-fixes).\n- USB: serial: option: add LARA-R6 01B PIDs (git-fixes).\n- usb: typec: Iterate pds array when showing the pd list (git-fixes).\n- usb: typec: Set port->pd before adding device for typec_port (git-fixes).\n- usb: typec: Use sysfs_emit_at when concatenating the string (git-fixes).\n- usb: xhci-mtk: set the dma max_seg_size (git-fixes).\n- vhost_net: revert upend_idx only on retriable error (git-fixes).\n- vhost: support PACKED when setting-getting vring_base (git-fixes).\n- virtio_net: Fix error unwinding of XDP initialization (git-fixes).\n- virtio-net: Maintain reverse cleanup order (git-fixes).\n- wifi: ath11k: add support for suspend in power down state (bsc#1207948).\n- wifi: ath11k: handle irq enable/disable in several code path (bsc#1207948).\n- wifi: ath11k: handle thermal device registeration together with MAC (bsc#1207948).\n- wifi: ath11k: remove MHI LOOPBACK channels (bsc#1207948).\n- wifi: ray_cs: Drop useless status variable in parse_addr() (git-fixes).\n- wifi: ray_cs: Utilize strnlen() in parse_addr() (git-fixes).\n- wl3501_cs: use eth_hw_addr_set() (git-fixes).\n- x86/PVH: obtain VGA console info in Dom0 (git-fixes).\n- xen/blkfront: Only check REQ_FUA for writes (git-fixes).\n- xen/pvcalls-back: fix double frees with pvcalls_new_active_socket() (git-fixes).\n- xfs: AIL needs asynchronous CIL forcing (bsc#1211811).\n- xfs: async CIL flushes need pending pushes to be made stable (bsc#1211811).\n- xfs: attach iclog callbacks in xlog_cil_set_ctx_write_state() (bsc#1211811).\n- xfs: CIL work is serialised, not pipelined (bsc#1211811).\n- xfs: do not run shutdown callbacks on active iclogs (bsc#1211811).\n- xfs: drop async cache flushes from CIL commits (bsc#1211811).\n- xfs: factor out log write ordering from xlog_cil_push_work() (bsc#1211811).\n- xfs: move the CIL workqueue to the CIL (bsc#1211811).\n- xfs: move xlog_commit_record to xfs_log_cil.c (bsc#1211811).\n- xfs: order CIL checkpoint start records (bsc#1211811).\n- xfs: pass a CIL context to xlog_write() (bsc#1211811).\n- xfs: rework xlog_state_do_callback() (bsc#1211811).\n- xfs: run callbacks before waking waiters in xlog_state_shutdown_callbacks (bsc#1211811).\n- xfs: separate out log shutdown callback processing (bsc#1211811).\n- xfs: wait iclog complete before tearing down AIL (bsc#1211811).\n- xfs: XLOG_STATE_IOERROR must die (bsc#1211811).\n- xhci: Fix resume issue of some ZHAOXIN hosts (git-fixes).\n- xhci: Fix TRB prefetch issue of ZHAOXIN hosts (git-fixes).\n- xhci: Show ZHAOXIN xHCI root hub speed correctly (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-3311,SUSE-SLE-Module-Basesystem-15-SP5-2023-3311,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3311,SUSE-SLE-Module-Legacy-15-SP5-2023-3311,SUSE-SLE-Module-Live-Patching-15-SP5-2023-3311,SUSE-SLE-Product-HA-15-SP5-2023-3311,SUSE-SLE-Product-WE-15-SP5-2023-3311,openSUSE-SLE-15.5-2023-3311", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3311-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:3311-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20233311-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:3311-1", url: "https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html", }, { category: "self", summary: "SUSE Bug 1206418", url: "https://bugzilla.suse.com/1206418", }, { category: "self", summary: "SUSE Bug 1207129", url: "https://bugzilla.suse.com/1207129", }, { category: "self", summary: "SUSE Bug 1207948", url: "https://bugzilla.suse.com/1207948", }, { category: "self", summary: "SUSE Bug 1210627", url: "https://bugzilla.suse.com/1210627", }, { category: "self", summary: "SUSE Bug 1210780", url: "https://bugzilla.suse.com/1210780", }, { category: "self", summary: "SUSE Bug 1210825", url: "https://bugzilla.suse.com/1210825", }, { category: "self", summary: "SUSE Bug 1211131", url: "https://bugzilla.suse.com/1211131", }, { category: "self", summary: "SUSE Bug 1211738", url: "https://bugzilla.suse.com/1211738", }, { category: "self", summary: "SUSE Bug 1211811", url: "https://bugzilla.suse.com/1211811", }, { category: "self", summary: "SUSE Bug 1212445", url: "https://bugzilla.suse.com/1212445", }, { category: "self", summary: "SUSE Bug 1212502", url: "https://bugzilla.suse.com/1212502", }, { category: "self", summary: "SUSE Bug 1212604", url: "https://bugzilla.suse.com/1212604", }, { category: "self", summary: "SUSE Bug 1212766", url: "https://bugzilla.suse.com/1212766", }, { category: "self", summary: "SUSE Bug 1212901", url: "https://bugzilla.suse.com/1212901", }, { category: "self", summary: "SUSE Bug 1213167", url: "https://bugzilla.suse.com/1213167", }, { category: "self", summary: "SUSE Bug 1213272", url: "https://bugzilla.suse.com/1213272", }, { category: "self", summary: "SUSE Bug 1213287", url: "https://bugzilla.suse.com/1213287", }, { category: "self", summary: "SUSE Bug 1213304", url: "https://bugzilla.suse.com/1213304", }, { category: "self", summary: "SUSE Bug 1213417", url: "https://bugzilla.suse.com/1213417", }, { category: "self", summary: "SUSE Bug 1213578", url: "https://bugzilla.suse.com/1213578", }, { category: "self", summary: "SUSE Bug 1213585", url: "https://bugzilla.suse.com/1213585", }, { category: "self", summary: "SUSE Bug 1213586", url: "https://bugzilla.suse.com/1213586", }, { category: "self", summary: "SUSE Bug 1213588", url: "https://bugzilla.suse.com/1213588", }, { category: "self", summary: "SUSE Bug 1213601", url: "https://bugzilla.suse.com/1213601", }, { category: "self", summary: "SUSE Bug 1213620", url: "https://bugzilla.suse.com/1213620", }, { category: "self", summary: "SUSE Bug 1213632", url: "https://bugzilla.suse.com/1213632", }, { category: "self", summary: "SUSE Bug 1213653", url: "https://bugzilla.suse.com/1213653", }, { category: "self", summary: "SUSE Bug 1213713", url: "https://bugzilla.suse.com/1213713", }, { category: "self", summary: "SUSE Bug 1213715", url: "https://bugzilla.suse.com/1213715", }, { category: "self", summary: "SUSE Bug 1213747", url: "https://bugzilla.suse.com/1213747", }, { category: "self", summary: "SUSE Bug 1213756", url: "https://bugzilla.suse.com/1213756", }, { category: "self", summary: "SUSE Bug 1213759", url: "https://bugzilla.suse.com/1213759", }, { category: "self", summary: "SUSE Bug 1213777", url: "https://bugzilla.suse.com/1213777", }, { category: "self", summary: "SUSE Bug 1213810", url: "https://bugzilla.suse.com/1213810", }, { category: "self", summary: "SUSE Bug 1213812", url: "https://bugzilla.suse.com/1213812", }, { category: "self", summary: "SUSE Bug 1213856", url: "https://bugzilla.suse.com/1213856", }, { category: "self", summary: "SUSE Bug 1213857", url: "https://bugzilla.suse.com/1213857", }, { category: "self", summary: "SUSE Bug 1213863", url: "https://bugzilla.suse.com/1213863", }, { category: "self", summary: "SUSE Bug 1213867", url: "https://bugzilla.suse.com/1213867", }, { category: "self", summary: "SUSE Bug 1213870", url: "https://bugzilla.suse.com/1213870", }, { category: "self", summary: "SUSE Bug 1213871", url: "https://bugzilla.suse.com/1213871", }, { category: "self", summary: "SUSE Bug 1213872", url: "https://bugzilla.suse.com/1213872", }, { category: "self", summary: "SUSE CVE CVE-2022-40982 page", url: "https://www.suse.com/security/cve/CVE-2022-40982/", }, { category: "self", summary: "SUSE CVE CVE-2023-0459 page", url: "https://www.suse.com/security/cve/CVE-2023-0459/", }, { category: "self", summary: "SUSE CVE CVE-2023-20569 page", url: "https://www.suse.com/security/cve/CVE-2023-20569/", }, { category: "self", summary: "SUSE CVE CVE-2023-21400 page", url: "https://www.suse.com/security/cve/CVE-2023-21400/", }, { category: "self", summary: "SUSE CVE CVE-2023-2156 page", url: "https://www.suse.com/security/cve/CVE-2023-2156/", }, { category: "self", summary: "SUSE CVE CVE-2023-2166 page", url: "https://www.suse.com/security/cve/CVE-2023-2166/", }, { category: "self", summary: "SUSE CVE CVE-2023-31083 page", url: "https://www.suse.com/security/cve/CVE-2023-31083/", }, { category: "self", summary: "SUSE CVE CVE-2023-3268 page", url: "https://www.suse.com/security/cve/CVE-2023-3268/", }, { category: "self", summary: "SUSE CVE CVE-2023-3567 page", url: "https://www.suse.com/security/cve/CVE-2023-3567/", }, { category: "self", summary: "SUSE CVE CVE-2023-3609 page", url: "https://www.suse.com/security/cve/CVE-2023-3609/", }, { category: "self", summary: "SUSE CVE CVE-2023-3611 page", url: "https://www.suse.com/security/cve/CVE-2023-3611/", }, { category: "self", summary: "SUSE CVE CVE-2023-3776 page", url: "https://www.suse.com/security/cve/CVE-2023-3776/", }, { category: "self", summary: "SUSE CVE CVE-2023-38409 page", url: "https://www.suse.com/security/cve/CVE-2023-38409/", }, { category: "self", summary: "SUSE CVE CVE-2023-3863 page", url: "https://www.suse.com/security/cve/CVE-2023-3863/", }, { category: "self", summary: "SUSE CVE CVE-2023-4004 page", url: "https://www.suse.com/security/cve/CVE-2023-4004/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-08-14T14:23:39Z", generator: { date: "2023-08-14T14:23:39Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:3311-1", initial_release_date: "2023-08-14T14:23:39Z", revision_history: [ { date: "2023-08-14T14:23:39Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", product: { name: "cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", product_id: "cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", product: { name: "cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", product_id: "cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", product: { name: "dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", product_id: "dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", product: { name: "dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", product_id: "dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "dtb-allwinner-5.14.21-150500.55.19.1.aarch64", product: { name: "dtb-allwinner-5.14.21-150500.55.19.1.aarch64", product_id: "dtb-allwinner-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "dtb-altera-5.14.21-150500.55.19.1.aarch64", product: { name: "dtb-altera-5.14.21-150500.55.19.1.aarch64", product_id: "dtb-altera-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "dtb-amazon-5.14.21-150500.55.19.1.aarch64", product: { name: "dtb-amazon-5.14.21-150500.55.19.1.aarch64", product_id: "dtb-amazon-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "dtb-amd-5.14.21-150500.55.19.1.aarch64", product: { name: "dtb-amd-5.14.21-150500.55.19.1.aarch64", product_id: "dtb-amd-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "dtb-amlogic-5.14.21-150500.55.19.1.aarch64", product: { name: "dtb-amlogic-5.14.21-150500.55.19.1.aarch64", product_id: "dtb-amlogic-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "dtb-apm-5.14.21-150500.55.19.1.aarch64", product: { name: "dtb-apm-5.14.21-150500.55.19.1.aarch64", product_id: "dtb-apm-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "dtb-apple-5.14.21-150500.55.19.1.aarch64", product: { name: "dtb-apple-5.14.21-150500.55.19.1.aarch64", product_id: "dtb-apple-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "dtb-arm-5.14.21-150500.55.19.1.aarch64", product: { name: "dtb-arm-5.14.21-150500.55.19.1.aarch64", product_id: "dtb-arm-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "dtb-broadcom-5.14.21-150500.55.19.1.aarch64", product: { name: "dtb-broadcom-5.14.21-150500.55.19.1.aarch64", product_id: "dtb-broadcom-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "dtb-cavium-5.14.21-150500.55.19.1.aarch64", product: { name: "dtb-cavium-5.14.21-150500.55.19.1.aarch64", product_id: "dtb-cavium-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "dtb-exynos-5.14.21-150500.55.19.1.aarch64", product: { name: "dtb-exynos-5.14.21-150500.55.19.1.aarch64", product_id: "dtb-exynos-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "dtb-freescale-5.14.21-150500.55.19.1.aarch64", product: { name: "dtb-freescale-5.14.21-150500.55.19.1.aarch64", product_id: "dtb-freescale-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", product: { name: "dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", product_id: "dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "dtb-lg-5.14.21-150500.55.19.1.aarch64", product: { name: "dtb-lg-5.14.21-150500.55.19.1.aarch64", product_id: "dtb-lg-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "dtb-marvell-5.14.21-150500.55.19.1.aarch64", product: { name: "dtb-marvell-5.14.21-150500.55.19.1.aarch64", product_id: "dtb-marvell-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "dtb-mediatek-5.14.21-150500.55.19.1.aarch64", product: { name: "dtb-mediatek-5.14.21-150500.55.19.1.aarch64", product_id: "dtb-mediatek-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "dtb-nvidia-5.14.21-150500.55.19.1.aarch64", product: { name: "dtb-nvidia-5.14.21-150500.55.19.1.aarch64", product_id: "dtb-nvidia-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "dtb-qcom-5.14.21-150500.55.19.1.aarch64", product: { name: "dtb-qcom-5.14.21-150500.55.19.1.aarch64", product_id: "dtb-qcom-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "dtb-renesas-5.14.21-150500.55.19.1.aarch64", product: { name: "dtb-renesas-5.14.21-150500.55.19.1.aarch64", product_id: "dtb-renesas-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "dtb-rockchip-5.14.21-150500.55.19.1.aarch64", product: { name: "dtb-rockchip-5.14.21-150500.55.19.1.aarch64", product_id: "dtb-rockchip-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "dtb-socionext-5.14.21-150500.55.19.1.aarch64", product: { name: "dtb-socionext-5.14.21-150500.55.19.1.aarch64", product_id: "dtb-socionext-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "dtb-sprd-5.14.21-150500.55.19.1.aarch64", product: { name: "dtb-sprd-5.14.21-150500.55.19.1.aarch64", product_id: "dtb-sprd-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "dtb-xilinx-5.14.21-150500.55.19.1.aarch64", product: { name: "dtb-xilinx-5.14.21-150500.55.19.1.aarch64", product_id: "dtb-xilinx-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", product: { name: "gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", product_id: "gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", product: { name: "gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", product_id: "gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-5.14.21-150500.55.19.1.aarch64", product: { name: "kernel-64kb-5.14.21-150500.55.19.1.aarch64", product_id: "kernel-64kb-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", product: { name: "kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", product_id: "kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", product: { name: "kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", product_id: "kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", product: { name: "kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", product_id: "kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", product: { name: "kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", product_id: "kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "kernel-default-5.14.21-150500.55.19.1.aarch64", product: { name: "kernel-default-5.14.21-150500.55.19.1.aarch64", product_id: "kernel-default-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", product: { name: "kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", product_id: "kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", product: { name: "kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", product_id: "kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150500.55.19.1.aarch64", product: { name: "kernel-default-devel-5.14.21-150500.55.19.1.aarch64", product_id: "kernel-default-devel-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150500.55.19.1.aarch64", product: { name: "kernel-default-extra-5.14.21-150500.55.19.1.aarch64", product_id: "kernel-default-extra-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", product: { name: "kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", product_id: "kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", product: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", product_id: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150500.55.19.1.aarch64", product: { name: "kernel-default-optional-5.14.21-150500.55.19.1.aarch64", product_id: "kernel-default-optional-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", product: { name: "kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", product_id: "kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", product: { name: "kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", product_id: "kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", product: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", product_id: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150500.55.19.1.aarch64", product: { name: "kernel-obs-build-5.14.21-150500.55.19.1.aarch64", product_id: "kernel-obs-build-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", product: { name: "kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", product_id: "kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150500.55.19.1.aarch64", product: { name: "kernel-syms-5.14.21-150500.55.19.1.aarch64", product_id: "kernel-syms-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", product: { name: "kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", product_id: "kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", product: { name: "kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", product_id: "kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", product: { name: "ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", product_id: "ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", product: { name: "ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", product_id: "ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", product: { name: "reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", product_id: "reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", product: { name: "reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", product_id: "reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-5.14.21-150500.55.19.1.noarch", product: { name: "kernel-devel-5.14.21-150500.55.19.1.noarch", product_id: "kernel-devel-5.14.21-150500.55.19.1.noarch", }, }, { category: "product_version", name: "kernel-docs-5.14.21-150500.55.19.1.noarch", product: { name: "kernel-docs-5.14.21-150500.55.19.1.noarch", product_id: "kernel-docs-5.14.21-150500.55.19.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-5.14.21-150500.55.19.1.noarch", product: { name: "kernel-docs-html-5.14.21-150500.55.19.1.noarch", product_id: "kernel-docs-html-5.14.21-150500.55.19.1.noarch", }, }, { category: "product_version", name: "kernel-macros-5.14.21-150500.55.19.1.noarch", product: { name: "kernel-macros-5.14.21-150500.55.19.1.noarch", product_id: "kernel-macros-5.14.21-150500.55.19.1.noarch", }, }, { category: "product_version", name: "kernel-source-5.14.21-150500.55.19.1.noarch", product: { name: "kernel-source-5.14.21-150500.55.19.1.noarch", product_id: "kernel-source-5.14.21-150500.55.19.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", product: { name: "kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", product_id: "kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", product: { name: "cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", product_id: "cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", product: { name: "dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", product_id: "dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", product: { name: "gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", product_id: "gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-5.14.21-150500.55.19.1.ppc64le", product: { name: "kernel-debug-5.14.21-150500.55.19.1.ppc64le", product_id: "kernel-debug-5.14.21-150500.55.19.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", product: { name: "kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", product_id: "kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", product: { name: "kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", product_id: "kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-5.14.21-150500.55.19.1.ppc64le", product: { name: "kernel-default-5.14.21-150500.55.19.1.ppc64le", product_id: "kernel-default-5.14.21-150500.55.19.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", product: { name: "kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", product_id: "kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", product: { name: "kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", product_id: "kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", product: { name: "kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", product_id: "kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", product: { name: "kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", product_id: "kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", product: { name: "kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", product_id: "kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", product: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", product_id: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", product: { name: "kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", product_id: "kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", product: { name: "kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", product_id: "kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", product: { name: "kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", product_id: "kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", product: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", product_id: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", product: { name: "kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", product_id: "kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", product: { name: "kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", product_id: "kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", product: { name: "kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", product_id: "kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150500.55.19.1.ppc64le", product: { name: "kernel-syms-5.14.21-150500.55.19.1.ppc64le", product_id: "kernel-syms-5.14.21-150500.55.19.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", product: { name: "kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", product_id: "kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", product: { name: "ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", product_id: "ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", product: { name: "reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", product_id: "reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", product: { name: "cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", product_id: "cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150500.55.19.1.s390x", product: { name: "dlm-kmp-default-5.14.21-150500.55.19.1.s390x", product_id: "dlm-kmp-default-5.14.21-150500.55.19.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", product: { name: "gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", product_id: "gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", }, }, { category: "product_version", name: "kernel-default-5.14.21-150500.55.19.1.s390x", product: { name: "kernel-default-5.14.21-150500.55.19.1.s390x", product_id: "kernel-default-5.14.21-150500.55.19.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150500.55.19.1.s390x", product: { name: "kernel-default-devel-5.14.21-150500.55.19.1.s390x", product_id: "kernel-default-devel-5.14.21-150500.55.19.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150500.55.19.1.s390x", product: { name: "kernel-default-extra-5.14.21-150500.55.19.1.s390x", product_id: "kernel-default-extra-5.14.21-150500.55.19.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", product: { name: "kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", product_id: "kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", product: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", product_id: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150500.55.19.1.s390x", product: { name: "kernel-default-optional-5.14.21-150500.55.19.1.s390x", product_id: "kernel-default-optional-5.14.21-150500.55.19.1.s390x", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", product: { name: "kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", product_id: "kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150500.55.19.1.s390x", product: { name: "kernel-obs-build-5.14.21-150500.55.19.1.s390x", product_id: "kernel-obs-build-5.14.21-150500.55.19.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150500.55.19.1.s390x", product: { name: "kernel-obs-qa-5.14.21-150500.55.19.1.s390x", product_id: "kernel-obs-qa-5.14.21-150500.55.19.1.s390x", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150500.55.19.1.s390x", product: { name: "kernel-syms-5.14.21-150500.55.19.1.s390x", product_id: "kernel-syms-5.14.21-150500.55.19.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", product: { name: "kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", product_id: "kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", product: { name: "kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", product_id: "kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", product: { name: "ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", product_id: "ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", product: { name: "reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", product_id: "reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", product: { name: "cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", product_id: "cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", product: { name: "dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", product_id: "dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", product: { name: "gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", product_id: "gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-5.14.21-150500.55.19.1.x86_64", product: { name: "kernel-debug-5.14.21-150500.55.19.1.x86_64", product_id: "kernel-debug-5.14.21-150500.55.19.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", product: { name: "kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", product_id: "kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", product: { name: "kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", product_id: "kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", product: { name: "kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", product_id: "kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", }, }, { category: "product_version", name: "kernel-default-5.14.21-150500.55.19.1.x86_64", product: { name: "kernel-default-5.14.21-150500.55.19.1.x86_64", product_id: "kernel-default-5.14.21-150500.55.19.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", product: { name: "kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", product_id: "kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", product: { name: "kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", product_id: "kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150500.55.19.1.x86_64", product: { name: "kernel-default-devel-5.14.21-150500.55.19.1.x86_64", product_id: "kernel-default-devel-5.14.21-150500.55.19.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150500.55.19.1.x86_64", product: { name: "kernel-default-extra-5.14.21-150500.55.19.1.x86_64", product_id: "kernel-default-extra-5.14.21-150500.55.19.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", product: { name: "kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", product_id: "kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", product: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", product_id: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150500.55.19.1.x86_64", product: { name: "kernel-default-optional-5.14.21-150500.55.19.1.x86_64", product_id: "kernel-default-optional-5.14.21-150500.55.19.1.x86_64", }, }, { category: "product_version", name: "kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", product: { name: "kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", product_id: "kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", product: { name: "kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", product_id: "kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", product: { name: "kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", product_id: "kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", product: { name: "kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", product_id: "kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", product: { name: "kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", product_id: "kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150500.55.19.1.x86_64", product: { name: "kernel-obs-build-5.14.21-150500.55.19.1.x86_64", product_id: "kernel-obs-build-5.14.21-150500.55.19.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", product: { name: "kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", product_id: "kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150500.55.19.1.x86_64", product: { name: "kernel-syms-5.14.21-150500.55.19.1.x86_64", product_id: "kernel-syms-5.14.21-150500.55.19.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", product: { name: "kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", product_id: "kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", product: { name: "ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", product_id: "ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", product: { name: "reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", product_id: "reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP5", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15 SP5", product: { name: "SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Legacy 15 SP5", product: { name: "SUSE Linux Enterprise Module for Legacy 15 SP5", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-legacy:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP5", product: { name: "SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15 SP5", product: { name: "SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 15 SP5", product: { name: "SUSE Linux Enterprise Workstation Extension 15 SP5", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:15:sp5", }, }, }, { category: "product_name", name: "openSUSE Leap 15.5", product: { name: "openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.14.21-150500.55.19.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", }, product_reference: "kernel-64kb-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", }, product_reference: "kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.19.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", }, product_reference: "kernel-default-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.19.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "kernel-default-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.19.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", }, product_reference: "kernel-default-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.19.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kernel-default-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", }, product_reference: "kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", }, product_reference: "kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", }, product_reference: "kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150500.55.19.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", }, product_reference: "kernel-default-devel-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150500.55.19.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150500.55.19.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", }, product_reference: "kernel-default-devel-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150500.55.19.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kernel-default-devel-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.14.21-150500.55.19.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", }, product_reference: "kernel-devel-5.14.21-150500.55.19.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.14.21-150500.55.19.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", }, product_reference: "kernel-macros-5.14.21-150500.55.19.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-5.14.21-150500.55.19.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", }, product_reference: "kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.14.21-150500.55.19.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", }, product_reference: "kernel-docs-5.14.21-150500.55.19.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150500.55.19.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", }, product_reference: "kernel-obs-build-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150500.55.19.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150500.55.19.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", }, product_reference: "kernel-obs-build-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150500.55.19.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kernel-obs-build-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.14.21-150500.55.19.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", }, product_reference: "kernel-source-5.14.21-150500.55.19.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150500.55.19.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", }, product_reference: "kernel-syms-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150500.55.19.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "kernel-syms-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150500.55.19.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", }, product_reference: "kernel-syms-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150500.55.19.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kernel-syms-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP5", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP5", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", }, product_reference: "reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150500.55.19.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", }, product_reference: "kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", }, product_reference: "kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", }, product_reference: "kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", }, product_reference: "kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", }, product_reference: "cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", }, product_reference: "cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", }, product_reference: "cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150500.55.19.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150500.55.19.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", }, product_reference: "dlm-kmp-default-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150500.55.19.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", }, product_reference: "dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", }, product_reference: "gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150500.55.19.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", }, product_reference: "gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", }, product_reference: "gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", }, product_reference: "ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", }, product_reference: "ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", }, product_reference: "ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150500.55.19.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP5", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kernel-default-extra-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", }, product_reference: "cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", }, product_reference: "cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", }, product_reference: "cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", }, product_reference: "cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150500.55.19.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", }, product_reference: "dlm-kmp-default-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150500.55.19.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", }, product_reference: "dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-allwinner-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dtb-allwinner-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-altera-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dtb-altera-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-amazon-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dtb-amazon-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-amd-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dtb-amd-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-amlogic-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dtb-amlogic-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-apm-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dtb-apm-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-apple-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dtb-apple-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-arm-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dtb-arm-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-broadcom-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dtb-broadcom-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-cavium-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dtb-cavium-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-exynos-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dtb-exynos-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-freescale-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dtb-freescale-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-hisilicon-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-lg-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dtb-lg-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-marvell-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dtb-marvell-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-mediatek-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dtb-mediatek-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-nvidia-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dtb-nvidia-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-qcom-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dtb-qcom-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-renesas-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dtb-renesas-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-rockchip-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dtb-rockchip-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-socionext-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dtb-socionext-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-sprd-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dtb-sprd-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dtb-xilinx-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", }, product_reference: "dtb-xilinx-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", }, product_reference: "gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", }, product_reference: "gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150500.55.19.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", }, product_reference: "gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", }, product_reference: "gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", }, product_reference: "kernel-64kb-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", }, product_reference: "kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", }, product_reference: "kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", }, product_reference: "kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", }, product_reference: "kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-5.14.21-150500.55.19.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "kernel-debug-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-5.14.21-150500.55.19.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kernel-debug-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-5.14.21-150500.55.19.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", }, product_reference: "kernel-default-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.19.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "kernel-default-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.19.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", }, product_reference: "kernel-default-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150500.55.19.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kernel-default-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", }, product_reference: "kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", }, product_reference: "kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", }, product_reference: "kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", }, product_reference: "kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", }, product_reference: "kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", }, product_reference: "kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", }, product_reference: "kernel-default-devel-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150500.55.19.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150500.55.19.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", }, product_reference: "kernel-default-devel-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150500.55.19.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kernel-default-devel-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", }, product_reference: "kernel-default-extra-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150500.55.19.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150500.55.19.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", }, product_reference: "kernel-default-extra-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150500.55.19.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kernel-default-extra-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", }, product_reference: "kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150500.55.19.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", }, product_reference: "kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", }, product_reference: "kernel-default-optional-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150500.55.19.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150500.55.19.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", }, product_reference: "kernel-default-optional-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150500.55.19.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kernel-default-optional-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-vdso-5.14.21-150500.55.19.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.14.21-150500.55.19.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", }, product_reference: "kernel-devel-5.14.21-150500.55.19.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.14.21-150500.55.19.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", }, product_reference: "kernel-docs-5.14.21-150500.55.19.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-html-5.14.21-150500.55.19.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", }, product_reference: "kernel-docs-html-5.14.21-150500.55.19.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", }, product_reference: "kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", }, product_reference: "kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.14.21-150500.55.19.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", }, product_reference: "kernel-macros-5.14.21-150500.55.19.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", }, product_reference: "kernel-obs-build-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150500.55.19.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150500.55.19.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", }, product_reference: "kernel-obs-build-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150500.55.19.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kernel-obs-build-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", }, product_reference: "kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150500.55.19.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", }, product_reference: "kernel-obs-qa-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150500.55.19.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.14.21-150500.55.19.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", }, product_reference: "kernel-source-5.14.21-150500.55.19.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-vanilla-5.14.21-150500.55.19.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", }, product_reference: "kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", }, product_reference: "kernel-syms-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150500.55.19.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "kernel-syms-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150500.55.19.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", }, product_reference: "kernel-syms-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150500.55.19.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kernel-syms-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-5.14.21-150500.55.19.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", }, product_reference: "kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", }, product_reference: "kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", }, product_reference: "kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150500.55.19.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", }, product_reference: "kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", }, product_reference: "kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", }, product_reference: "ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", }, product_reference: "ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", }, product_reference: "ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", }, product_reference: "ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", }, product_reference: "reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", }, product_reference: "reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, ], }, vulnerabilities: [ { cve: "CVE-2022-40982", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-40982", }, ], notes: [ { category: "general", text: "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-40982", url: "https://www.suse.com/security/cve/CVE-2022-40982", }, { category: "external", summary: "SUSE Bug 1206418 for CVE-2022-40982", url: "https://bugzilla.suse.com/1206418", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2022-40982", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T14:23:39Z", details: "moderate", }, ], title: "CVE-2022-40982", }, { cve: "CVE-2023-0459", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-0459", }, ], notes: [ { category: "general", text: "Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the \"access_ok\" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-0459", url: "https://www.suse.com/security/cve/CVE-2023-0459", }, { category: "external", summary: "SUSE Bug 1211738 for CVE-2023-0459", url: "https://bugzilla.suse.com/1211738", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-0459", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T14:23:39Z", details: "moderate", }, ], title: "CVE-2023-0459", }, { cve: "CVE-2023-20569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-20569", }, ], notes: [ { category: "general", text: "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-20569", url: "https://www.suse.com/security/cve/CVE-2023-20569", }, { category: "external", summary: "SUSE Bug 1213287 for CVE-2023-20569", url: "https://bugzilla.suse.com/1213287", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T14:23:39Z", details: "moderate", }, ], title: "CVE-2023-20569", }, { cve: "CVE-2023-21400", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-21400", }, ], notes: [ { category: "general", text: "In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-21400", url: "https://www.suse.com/security/cve/CVE-2023-21400", }, { category: "external", summary: "SUSE Bug 1213272 for CVE-2023-21400", url: "https://bugzilla.suse.com/1213272", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T14:23:39Z", details: "moderate", }, ], title: "CVE-2023-21400", }, { cve: "CVE-2023-2156", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2156", }, ], notes: [ { category: "general", text: "A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2156", url: "https://www.suse.com/security/cve/CVE-2023-2156", }, { category: "external", summary: "SUSE Bug 1211131 for CVE-2023-2156", url: "https://bugzilla.suse.com/1211131", }, { category: "external", summary: "SUSE Bug 1211395 for CVE-2023-2156", url: "https://bugzilla.suse.com/1211395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T14:23:39Z", details: "important", }, ], title: "CVE-2023-2156", }, { cve: "CVE-2023-2166", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2166", }, ], notes: [ { category: "general", text: "A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2166", url: "https://www.suse.com/security/cve/CVE-2023-2166", }, { category: "external", summary: "SUSE Bug 1210627 for CVE-2023-2166", url: "https://bugzilla.suse.com/1210627", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T14:23:39Z", details: "moderate", }, ], title: "CVE-2023-2166", }, { cve: "CVE-2023-31083", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-31083", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu->proto is set. A NULL pointer dereference may occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-31083", url: "https://www.suse.com/security/cve/CVE-2023-31083", }, { category: "external", summary: "SUSE Bug 1210780 for CVE-2023-31083", url: "https://bugzilla.suse.com/1210780", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T14:23:39Z", details: "moderate", }, ], title: "CVE-2023-31083", }, { cve: "CVE-2023-3268", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3268", }, ], notes: [ { category: "general", text: "An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3268", url: "https://www.suse.com/security/cve/CVE-2023-3268", }, { category: "external", summary: "SUSE Bug 1212502 for CVE-2023-3268", url: "https://bugzilla.suse.com/1212502", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-3268", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T14:23:39Z", details: "moderate", }, ], title: "CVE-2023-3268", }, { cve: "CVE-2023-3567", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3567", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3567", url: "https://www.suse.com/security/cve/CVE-2023-3567", }, { category: "external", summary: "SUSE Bug 1213167 for CVE-2023-3567", url: "https://bugzilla.suse.com/1213167", }, { category: "external", summary: "SUSE Bug 1213244 for CVE-2023-3567", url: "https://bugzilla.suse.com/1213244", }, { category: "external", summary: "SUSE Bug 1213842 for CVE-2023-3567", url: "https://bugzilla.suse.com/1213842", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-3567", url: "https://bugzilla.suse.com/1215674", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3567", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3567", url: "https://bugzilla.suse.com/1217531", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T14:23:39Z", details: "important", }, ], title: "CVE-2023-3567", }, { cve: "CVE-2023-3609", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3609", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3609", url: "https://www.suse.com/security/cve/CVE-2023-3609", }, { category: "external", summary: "SUSE Bug 1213586 for CVE-2023-3609", url: "https://bugzilla.suse.com/1213586", }, { category: "external", summary: "SUSE Bug 1213587 for CVE-2023-3609", url: "https://bugzilla.suse.com/1213587", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3609", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3609", url: "https://bugzilla.suse.com/1217531", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T14:23:39Z", details: "moderate", }, ], title: "CVE-2023-3609", }, { cve: "CVE-2023-3611", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3611", }, ], notes: [ { category: "general", text: "An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.\n\nWe recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3611", url: "https://www.suse.com/security/cve/CVE-2023-3611", }, { category: "external", summary: "SUSE Bug 1213585 for CVE-2023-3611", url: "https://bugzilla.suse.com/1213585", }, { category: "external", summary: "SUSE Bug 1223091 for CVE-2023-3611", url: "https://bugzilla.suse.com/1223091", }, { category: "external", summary: "SUSE Bug 1223973 for CVE-2023-3611", url: "https://bugzilla.suse.com/1223973", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T14:23:39Z", details: "moderate", }, ], title: "CVE-2023-3611", }, { cve: "CVE-2023-3776", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3776", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3776", url: "https://www.suse.com/security/cve/CVE-2023-3776", }, { category: "external", summary: "SUSE Bug 1213588 for CVE-2023-3776", url: "https://bugzilla.suse.com/1213588", }, { category: "external", summary: "SUSE Bug 1215119 for CVE-2023-3776", url: "https://bugzilla.suse.com/1215119", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-3776", url: "https://bugzilla.suse.com/1215674", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3776", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3776", url: "https://bugzilla.suse.com/1217531", }, { category: "external", summary: "SUSE Bug 1221578 for CVE-2023-3776", url: "https://bugzilla.suse.com/1221578", }, { category: "external", summary: "SUSE Bug 1221598 for CVE-2023-3776", url: "https://bugzilla.suse.com/1221598", }, { category: "external", summary: "SUSE Bug 1223091 for CVE-2023-3776", url: "https://bugzilla.suse.com/1223091", }, { category: "external", summary: "SUSE Bug 1223973 for CVE-2023-3776", url: "https://bugzilla.suse.com/1223973", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T14:23:39Z", details: "moderate", }, ], title: "CVE-2023-3776", }, { cve: "CVE-2023-38409", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-38409", }, ], notes: [ { category: "general", text: "An issue was discovered in set_con2fb_map in drivers/video/fbdev/core/fbcon.c in the Linux kernel before 6.2.12. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-38409", url: "https://www.suse.com/security/cve/CVE-2023-38409", }, { category: "external", summary: "SUSE Bug 1213417 for CVE-2023-38409", url: "https://bugzilla.suse.com/1213417", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T14:23:39Z", details: "low", }, ], title: "CVE-2023-38409", }, { cve: "CVE-2023-3863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3863", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC in the Linux kernel. This flaw allows a local user with special privileges to impact a kernel information leak issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3863", url: "https://www.suse.com/security/cve/CVE-2023-3863", }, { category: "external", summary: "SUSE Bug 1213601 for CVE-2023-3863", url: "https://bugzilla.suse.com/1213601", }, { category: "external", summary: "SUSE Bug 1213603 for CVE-2023-3863", url: "https://bugzilla.suse.com/1213603", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3863", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3863", url: "https://bugzilla.suse.com/1217531", }, { category: "external", summary: "SUSE Bug 1219704 for CVE-2023-3863", url: "https://bugzilla.suse.com/1219704", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T14:23:39Z", details: "moderate", }, ], title: "CVE-2023-3863", }, { cve: "CVE-2023-4004", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4004", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4004", url: "https://www.suse.com/security/cve/CVE-2023-4004", }, { category: "external", summary: "SUSE Bug 1213812 for CVE-2023-4004", url: "https://bugzilla.suse.com/1213812", }, { category: "external", summary: "SUSE Bug 1214812 for CVE-2023-4004", url: "https://bugzilla.suse.com/1214812", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_19-default-1-150500.11.3.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-devel-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-macros-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-docs-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-source-5.14.21-150500.55.19.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:cluster-md-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:dlm-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:dtb-allwinner-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-altera-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amazon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-amlogic-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-apple-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-arm-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-broadcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-cavium-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-exynos-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-freescale-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-hisilicon-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-lg-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-marvell-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-mediatek-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-nvidia-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-qcom-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-renesas-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-rockchip-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-socionext-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-sprd-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:dtb-xilinx-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:gfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-64kb-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-debug-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-debug-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.aarch64", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.ppc64le", "openSUSE Leap 15.5:kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4.x86_64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-extra-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-default-optional-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-default-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-devel-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-docs-html-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-kvmsmall-vdso-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-macros-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-build-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-obs-qa-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-source-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-source-vanilla-5.14.21-150500.55.19.1.noarch", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kernel-syms-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:kernel-zfcpdump-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:kselftests-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:ocfs2-kmp-default-5.14.21-150500.55.19.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-64kb-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.ppc64le", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.s390x", "openSUSE Leap 15.5:reiserfs-kmp-default-5.14.21-150500.55.19.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T14:23:39Z", details: "important", }, ], title: "CVE-2023-4004", }, ], }
suse-su-2023:3377-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe SUSE Linux Enterprise 15 SP4 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-40982: Fixed transient execution attack called 'Gather Data Sampling' (bsc#1206418).\n- CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec (bsc#1211738).\n- CVE-2023-20569: Fixed side channel attack ‘Inception’ or ‘RAS Poisoning’ (bsc#1213287).\n- CVE-2023-21400: Fixed several memory corruptions due to improper locking in io_uring (bsc#1213272).\n- CVE-2023-2156: Fixed a flaw in the networking subsystem within the handling of the RPL protocol (bsc#1211131).\n- CVE-2023-2166: Fixed NULL pointer dereference in can_rcv_filter (bsc#1210627).\n- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).\n- CVE-2023-3268: Fixed an out of bounds memory access flaw in relay_file_read_start_pos in the relayfs (bsc#1212502).\n- CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c (bsc#1213167).\n- CVE-2023-3776: Fixed improper refcount update in cls_fw leads to use-after-free (bsc#1213588).\n- CVE-2023-4004: Fixed improper element removal netfilter nft_set_pipapo (bsc#1213812).\n\nThe following non-security bugs were fixed:\n\n- afs: adjust ack interpretation to try and cope with nat (git-fixes).\n- afs: fix access after dec in put functions (git-fixes).\n- afs: fix afs_getattr() to refetch file status if callback break occurred (git-fixes).\n- afs: fix dynamic root getattr (git-fixes).\n- afs: fix fileserver probe rtt handling (git-fixes).\n- afs: fix infinite loop found by xfstest generic/676 (git-fixes).\n- afs: fix lost servers_outstanding count (git-fixes).\n- afs: fix server->active leak in afs_put_server (git-fixes).\n- afs: fix setting of mtime when creating a file/dir/symlink (git-fixes).\n- afs: fix updating of i_size with dv jump from server (git-fixes).\n- afs: fix vlserver probe rtt handling (git-fixes).\n- afs: return -eagain, not -eremoteio, when a file already locked (git-fixes).\n- afs: use refcount_t rather than atomic_t (git-fixes).\n- afs: use the operation issue time instead of the reply time for callbacks (git-fixes).\n- alsa: emu10k1: roll up loops in dsp setup code for audigy (git-fixes).\n- alsa: hda/realtek: support asus g713pv laptop (git-fixes).\n- alsa: hda/relatek: enable mute led on hp 250 g8 (git-fixes).\n- alsa: usb-audio: add quirk for microsoft modern wireless headset (bsc#1207129).\n- alsa: usb-audio: update for native dsd support quirks (git-fixes).\n- asoc: atmel: fix the 8k sample parameter in i2sc master (git-fixes).\n- asoc: codecs: es8316: fix dmic config (git-fixes).\n- asoc: da7219: check for failure reading aad irq events (git-fixes).\n- asoc: da7219: flush pending aad irq when suspending (git-fixes).\n- asoc: fsl_sai: disable bit clock with transmitter (git-fixes).\n- asoc: fsl_spdif: silence output on stop (git-fixes).\n- asoc: rt5682-sdw: fix for jd event handling in clockstop mode0 (git-fixes).\n- asoc: rt711-sdca: fix for jd event handling in clockstop mode0 (git-fixes).\n- asoc: rt711: fix for jd event handling in clockstop mode0 (git-fixes).\n- asoc: wm8904: fill the cache for wm8904_adc_test_0 register (git-fixes).\n- ata: pata_ns87415: mark ns87560_tf_read static (git-fixes).\n- block, bfq: fix division by zero error on zero wsum (bsc#1213653).\n- block: fix a source code comment in include/uapi/linux/blkzoned.h (git-fixes).\n- can: gs_usb: gs_can_close(): add missing set of can state to can_state_stopped (git-fixes).\n- ceph: do not let check_caps skip sending responses for revoke msgs (bsc#1213856).\n- coda: avoid partial allocation of sig_inputargs (git-fixes).\n- dlm: fix missing lkb refcount handling (git-fixes).\n- dlm: fix plock invalid read (git-fixes).\n- documentation: devices.txt: reconcile serial/ucc_uart minor numers (git-fixes).\n- drm/amd/display: disable mpc split by default on special asic (git-fixes).\n- drm/amd/display: keep phy active for dp displays on dcn31 (git-fixes).\n- drm/client: fix memory leak in drm_client_modeset_probe (git-fixes).\n- drm/msm/adreno: fix snapshot bindless_data size (git-fixes).\n- drm/msm/dpu: drop enum dpu_core_perf_data_bus_id (git-fixes).\n- drm/msm: fix is_err_or_null() vs null check in a5xx_submit_in_rb() (git-fixes).\n- drm/radeon: fix integer overflow in radeon_cs_parser_init (git-fixes).\n- drop amdgpu patches for fixing regression (bsc#1213304,bsc#1213777)\n- file: always lock position for fmode_atomic_pos (bsc#1213759).\n- fs: dlm: add midcomms init/start functions (git-fixes).\n- fs: dlm: do not set stop rx flag after node reset (git-fixes).\n- fs: dlm: filter user dlm messages for kernel locks (git-fixes).\n- fs: dlm: fix log of lowcomms vs midcomms (git-fixes).\n- fs: dlm: fix race between test_bit() and queue_work() (git-fixes).\n- fs: dlm: fix race in lowcomms (git-fixes).\n- fs: dlm: handle -ebusy first in lock arg validation (git-fixes).\n- fs: dlm: move sending fin message into state change handling (git-fixes).\n- fs: dlm: retry accept() until -eagain or error returns (git-fixes).\n- fs: dlm: return positive pid value for f_getlk (git-fixes).\n- fs: dlm: start midcomms before scand (git-fixes).\n- fs: hfsplus: remove warn_on() from hfsplus_cat_{read,write}_inode() (git-fixes).\n- fs: jfs: check for read-only mounted filesystem in txbegin (git-fixes).\n- fs: jfs: fix null-ptr-deref read in txbegin (git-fixes).\n- fs: jfs: fix ubsan: array-index-out-of-bounds in dballocdmaplev (git-fixes).\n- gve: set default duplex configuration to full (git-fixes).\n- gve: unify driver name usage (git-fixes).\n- hwmon: (k10temp) enable amd3255 proc to show negative temperature (git-fixes).\n- hwmon: (nct7802) fix for temp6 (peci1) processed even if peci1 disabled (git-fixes).\n- iavf: fix out-of-bounds when setting channels on remove (git-fixes).\n- iavf: fix use-after-free in free_netdev (git-fixes).\n- iavf: use internal state to free traffic irqs (git-fixes).\n- igc: check if hardware tx timestamping is enabled earlier (git-fixes).\n- igc: enable and fix rx hash usage by netstack (git-fixes).\n- igc: fix inserting of empty frame for launchtime (git-fixes).\n- igc: fix kernel panic during ndo_tx_timeout callback (git-fixes).\n- igc: fix launchtime before start of cycle (git-fixes).\n- igc: fix race condition in ptp tx code (git-fixes).\n- igc: handle pps start time programming for past time values (git-fixes).\n- igc: prevent garbled tx queue with xdp zerocopy (git-fixes).\n- igc: remove delay during tx ring configuration (git-fixes).\n- igc: set tp bit in 'supported' and 'advertising' fields of ethtool_link_ksettings (git-fixes).\n- igc: work around hw bug causing missing timestamps (git-fixes).\n- input: i8042 - add clevo pcx0dx to i8042 quirk table (git-fixes).\n- input: iqs269a - do not poll during ati (git-fixes).\n- input: iqs269a - do not poll during suspend or resume (git-fixes).\n- jffs2: fix memory leak in jffs2_do_fill_super (git-fixes).\n- jffs2: fix memory leak in jffs2_do_mount_fs (git-fixes).\n- jffs2: fix memory leak in jffs2_scan_medium (git-fixes).\n- jffs2: fix use-after-free in jffs2_clear_xattr_subsystem (git-fixes).\n- jffs2: gc deadlock reading a page that is used in jffs2_write_begin() (git-fixes).\n- jffs2: reduce stack usage in jffs2_build_xattr_subsystem() (git-fixes).\n- jfs: jfs_dmap: validate db_l2nbperpage while mounting (git-fixes).\n- kernel-binary.spec.in: remove superfluous %% in supplements fixes: 02b7735e0caf ('rpm/kernel-binary.spec.in: add enhances and supplements tags to in-tree kmps')\n- kvm: arm64: do not read a hw interrupt pending state in user context (git-fixes)\n- kvm: arm64: warn if accessing timer pending state outside of vcpu (bsc#1213620)\n- kvm: do not null dereference ops->destroy (git-fixes)\n- kvm: downgrade two bug_ons to warn_on_once (git-fixes)\n- kvm: initialize debugfs_dentry when a vm is created to avoid null (git-fixes)\n- kvm: s390: pv: fix index value of replaced asce (git-fixes bsc#1213867).\n- kvm: vmx: inject #gp on encls if vcpu has paging disabled (cr0.pg==0) (git-fixes).\n- kvm: vmx: inject #gp, not #ud, if sgx2 encls leafs are unsupported (git-fixes).\n- kvm: vmx: restore vmx_vmexit alignment (git-fixes).\n- kvm: x86: account fastpath-only vm-exits in vcpu stats (git-fixes).\n- libceph: harden msgr2.1 frame segment length checks (bsc#1213857).\n- media: staging: atomisp: select v4l2_fwnode (git-fixes).\n- net: ena: fix shift-out-of-bounds in exponential backoff (git-fixes).\n- net: mana: batch ringing rx queue doorbell on receiving packets (bsc#1212901).\n- net: mana: use the correct wqe count for ringing rq doorbell (bsc#1212901).\n- net: phy: marvell10g: fix 88x3310 power up (git-fixes).\n- nfsd: add encoding of op_recall flag for write delegation (git-fixes).\n- nfsd: fix double fget() bug in __write_ports_addfd() (git-fixes).\n- nfsd: fix sparse warning (git-fixes).\n- nfsd: remove open coding of string copy (git-fixes).\n- nfsv4.1: always send a reclaim_complete after establishing lease (git-fixes).\n- nfsv4.1: freeze the session table upon receiving nfs4err_badsession (git-fixes).\n- nvme-pci: fix dma direction of unmapping integrity data (git-fixes).\n- nvme-pci: remove nvme_queue from nvme_iod (git-fixes).\n- octeontx-af: fix hardware timestamp configuration (git-fixes).\n- octeontx2-af: move validation of ptp pointer before its usage (git-fixes).\n- octeontx2-pf: add additional check for mcam rules (git-fixes).\n- phy: hisilicon: fix an out of bounds check in hisi_inno_phy_probe() (git-fixes).\n- pinctrl: amd: do not show `invalid config param` errors (git-fixes).\n- pinctrl: amd: use amd_pinconf_set() for all config options (git-fixes).\n- platform/x86: msi-laptop: fix rfkill out-of-sync on msi wind u100 (git-fixes).\n- rdma/bnxt_re: fix hang during driver unload (git-fixes)\n- rdma/bnxt_re: prevent handling any completions after qp destroy (git-fixes)\n- rdma/core: update cma destination address on rdma_resolve_addr (git-fixes)\n- rdma/irdma: add missing read barriers (git-fixes)\n- rdma/irdma: fix data race on cqp completion stats (git-fixes)\n- rdma/irdma: fix data race on cqp request done (git-fixes)\n- rdma/irdma: fix op_type reporting in cqes (git-fixes)\n- rdma/irdma: report correct wc error (git-fixes)\n- rdma/mlx4: make check for invalid flags stricter (git-fixes)\n- rdma/mthca: fix crash when polling cq for shared qps (git-fixes)\n- regmap: account for register length in smbus i/o limits (git-fixes).\n- regmap: drop initial version of maximum transfer length fixes (git-fixes).\n- revert 'debugfs, coccinelle: check for obsolete define_simple_attribute() usage' (git-fixes).\n- revert 'nfsv4: retry lock on old_stateid during delegation return' (git-fixes).\n- revert 'usb: dwc3: core: enable autoretry feature in the controller' (git-fixes).\n- revert 'usb: gadget: tegra-xudc: fix error check in tegra_xudc_powerdomain_init()' (git-fixes).\n- revert 'usb: xhci: tegra: fix error check' (git-fixes).\n- rpm: update dependency to match current kmod.\n- rxrpc, afs: fix selection of abort codes (git-fixes).\n- s390/bpf: add expoline to tail calls (git-fixes bsc#1213870).\n- s390/dasd: fix hanging device after quiesce/resume (git-fixes bsc#1213810).\n- s390/decompressor: specify __decompress() buf len to avoid overflow (git-fixes bsc#1213863).\n- s390/ipl: add missing intersection check to ipl_report handling (git-fixes bsc#1213871).\n- s390/qeth: fix vipa deletion (git-fixes bsc#1213713).\n- s390/vmem: fix empty page tables cleanup under kasan (git-fixes bsc#1213715).\n- s390: introduce nospec_uses_trampoline() (git-fixes bsc#1213870).\n- scftorture: count reschedule ipis (git-fixes).\n- scsi: lpfc: abort outstanding els cmds when mailbox timeout error is detected (bsc#1213756).\n- scsi: lpfc: avoid -wstringop-overflow warning (bsc#1213756).\n- scsi: lpfc: clean up sli-4 sysfs resource reporting (bsc#1213756).\n- scsi: lpfc: copyright updates for 14.2.0.14 patches (bsc#1213756).\n- scsi: lpfc: fix a possible data race in lpfc_unregister_fcf_rescan() (bsc#1213756).\n- scsi: lpfc: fix incorrect big endian type assignment in bsg loopback path (bsc#1213756).\n- scsi: lpfc: fix incorrect big endian type assignments in fdmi and vmid paths (bsc#1213756).\n- scsi: lpfc: fix lpfc_name struct packing (bsc#1213756).\n- scsi: lpfc: make fabric zone discovery more robust when handling unsolicited logo (bsc#1213756).\n- scsi: lpfc: pull out fw diagnostic dump log message from driver's trace buffer (bsc#1213756).\n- scsi: lpfc: qualify ndlp discovery state when processing rscn (bsc#1213756).\n- scsi: lpfc: refactor cpu affinity assignment paths (bsc#1213756).\n- scsi: lpfc: remove extra ndlp kref decrement in flogi cmpl for loop topology (bsc#1213756).\n- scsi: lpfc: replace all non-returning strlcpy() with strscpy() (bsc#1213756).\n- scsi: lpfc: replace one-element array with flexible-array member (bsc#1213756).\n- scsi: lpfc: revise ndlp kref handling for dev_loss_tmo_callbk and lpfc_drop_node (bsc#1213756).\n- scsi: lpfc: set establish image pair service parameter only for target functions (bsc#1213756).\n- scsi: lpfc: simplify fcp_abort transport callback log message (bsc#1213756).\n- scsi: lpfc: update lpfc version to 14.2.0.14 (bsc#1213756).\n- scsi: lpfc: use struct_size() helper (bsc#1213756).\n- scsi: qla2xxx: adjust iocb resource on qpair create (bsc#1213747).\n- scsi: qla2xxx: array index may go out of bound (bsc#1213747).\n- scsi: qla2xxx: avoid fcport pointer dereference (bsc#1213747).\n- scsi: qla2xxx: check valid rport returned by fc_bsg_to_rport() (bsc#1213747).\n- scsi: qla2xxx: correct the index of array (bsc#1213747).\n- scsi: qla2xxx: drop useless list_head (bsc#1213747).\n- scsi: qla2xxx: fix buffer overrun (bsc#1213747).\n- scsi: qla2xxx: fix command flush during tmf (bsc#1213747).\n- scsi: qla2xxx: fix deletion race condition (bsc#1213747).\n- scsi: qla2xxx: fix end of loop test (bsc#1213747).\n- scsi: qla2xxx: fix erroneous link up failure (bsc#1213747).\n- scsi: qla2xxx: fix error code in qla2x00_start_sp() (bsc#1213747).\n- scsi: qla2xxx: fix inconsistent tmf timeout (bsc#1213747).\n- scsi: qla2xxx: fix null pointer dereference in target mode (bsc#1213747).\n- scsi: qla2xxx: fix potential null pointer dereference (bsc#1213747).\n- scsi: qla2xxx: fix session hang in gnl (bsc#1213747).\n- scsi: qla2xxx: fix tmf leak through (bsc#1213747).\n- scsi: qla2xxx: limit tmf to 8 per function (bsc#1213747).\n- scsi: qla2xxx: pointer may be dereferenced (bsc#1213747).\n- scsi: qla2xxx: remove unused nvme_ls_waitq wait queue (bsc#1213747).\n- scsi: qla2xxx: replace one-element array with declare_flex_array() helper (bsc#1213747).\n- scsi: qla2xxx: silence a static checker warning (bsc#1213747).\n- scsi: qla2xxx: turn off noisy message log (bsc#1213747).\n- scsi: qla2xxx: update version to 10.02.08.400-k (bsc#1213747).\n- scsi: qla2xxx: update version to 10.02.08.500-k (bsc#1213747).\n- scsi: qla2xxx: use vmalloc_array() and vcalloc() (bsc#1213747).\n- serial: qcom-geni: drop bogus runtime pm state update (git-fixes).\n- serial: sifive: fix sifive_serial_console_setup() section (git-fixes).\n- soundwire: qcom: update status correctly with mask (git-fixes).\n- staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() (git-fixes).\n- staging: r8712: fix memory leak in _r8712_init_xmit_priv() (git-fixes).\n- sunrpc: always free ctxt when freeing deferred request (git-fixes).\n- sunrpc: double free xprt_ctxt while still in use (git-fixes).\n- sunrpc: fix trace_svc_register() call site (git-fixes).\n- sunrpc: fix uaf in svc_tcp_listen_data_ready() (git-fixes).\n- sunrpc: remove dead code in svc_tcp_release_rqst() (git-fixes).\n- sunrpc: remove the maximum number of retries in call_bind_status (git-fixes).\n- svcrdma: prevent page release when nothing was received (git-fixes).\n- tpm_tis: explicitly check for error code (git-fixes).\n- tty: n_gsm: fix uaf in gsm_cleanup_mux (git-fixes).\n- ubifs: add missing iput if do_tmpfile() failed in rename whiteout (git-fixes).\n- ubifs: do_rename: fix wrong space budget when target inode's nlink > 1 (git-fixes).\n- ubifs: error path in ubifs_remount_rw() seems to wrongly free write buffers (git-fixes).\n- ubifs: fix 'ui->dirty' race between do_tmpfile() and writeback work (git-fixes).\n- ubifs: fix aa deadlock when setting xattr for encrypted file (git-fixes).\n- ubifs: fix build errors as symbol undefined (git-fixes).\n- ubifs: fix deadlock in concurrent rename whiteout and inode writeback (git-fixes).\n- ubifs: fix memory leak in alloc_wbufs() (git-fixes).\n- ubifs: fix memory leak in do_rename (git-fixes).\n- ubifs: fix read out-of-bounds in ubifs_wbuf_write_nolock() (git-fixes).\n- ubifs: fix to add refcount once page is set private (git-fixes).\n- ubifs: fix wrong dirty space budget for dirty inode (git-fixes).\n- ubifs: free memory for tmpfile name (git-fixes).\n- ubifs: rectify space amount budget for mkdir/tmpfile operations (git-fixes).\n- ubifs: rectify space budget for ubifs_symlink() if symlink is encrypted (git-fixes).\n- ubifs: rectify space budget for ubifs_xrename() (git-fixes).\n- ubifs: rename whiteout atomically (git-fixes).\n- ubifs: rename_whiteout: correct old_dir size computing (git-fixes).\n- ubifs: rename_whiteout: fix double free for whiteout_ui->data (git-fixes).\n- ubifs: reserve one leb for each journal head while doing budget (git-fixes).\n- ubifs: setflags: make dirtied_ino_d 8 bytes aligned (git-fixes).\n- ubifs: ubifs_writepage: mark page dirty after writing inode failed (git-fixes).\n- update patches.suse/rdma-mthca-fix-crash-when-polling-cq-for-shared-qps. (git-fixes bsc#1212604). added bug reference.\n- usb: dwc3: do not reset device side if dwc3 was configured as host-only (git-fixes).\n- usb: dwc3: pci: skip byt gpio lookup table for hardwired phy (git-fixes).\n- usb: gadget: core: remove unbalanced mutex_unlock in usb_gadget_activate (git-fixes).\n- usb: xhci-mtk: set the dma max_seg_size (git-fixes).\n- vhost: support packed when setting-getting vring_base (git-fixes).\n- vhost_net: revert upend_idx only on retriable error (git-fixes).\n- virtio-net: maintain reverse cleanup order (git-fixes).\n- virtio_net: fix error unwinding of xdp initialization (git-fixes).\n- x86/pvh: obtain vga console info in dom0 (git-fixes).\n- xen/blkfront: only check req_fua for writes (git-fixes).\n- xen/pvcalls-back: fix double frees with pvcalls_new_active_socket() (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-3377,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-3377,openSUSE-SLE-15.4-2023-3377", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3377-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:3377-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20233377-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:3377-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html", }, { category: "self", summary: "SUSE Bug 1206418", url: "https://bugzilla.suse.com/1206418", }, { category: "self", summary: "SUSE Bug 1207129", url: "https://bugzilla.suse.com/1207129", }, { category: "self", summary: "SUSE Bug 1210627", url: "https://bugzilla.suse.com/1210627", }, { category: "self", summary: "SUSE Bug 1210780", url: "https://bugzilla.suse.com/1210780", }, { category: "self", summary: "SUSE Bug 1211131", url: "https://bugzilla.suse.com/1211131", }, { category: "self", summary: "SUSE Bug 1211738", url: "https://bugzilla.suse.com/1211738", }, { category: "self", summary: "SUSE Bug 1212502", url: "https://bugzilla.suse.com/1212502", }, { category: "self", summary: "SUSE Bug 1212604", url: "https://bugzilla.suse.com/1212604", }, { category: "self", summary: "SUSE Bug 1212901", url: "https://bugzilla.suse.com/1212901", }, { category: "self", summary: "SUSE Bug 1213167", url: "https://bugzilla.suse.com/1213167", }, { category: "self", summary: "SUSE Bug 1213272", url: "https://bugzilla.suse.com/1213272", }, { category: "self", summary: "SUSE Bug 1213287", url: "https://bugzilla.suse.com/1213287", }, { category: "self", summary: "SUSE Bug 1213304", url: "https://bugzilla.suse.com/1213304", }, { category: "self", summary: "SUSE Bug 1213588", url: "https://bugzilla.suse.com/1213588", }, { category: "self", summary: "SUSE Bug 1213620", url: "https://bugzilla.suse.com/1213620", }, { category: "self", summary: "SUSE Bug 1213653", url: "https://bugzilla.suse.com/1213653", }, { category: "self", summary: "SUSE Bug 1213713", url: "https://bugzilla.suse.com/1213713", }, { category: "self", summary: "SUSE Bug 1213715", url: "https://bugzilla.suse.com/1213715", }, { category: "self", summary: "SUSE Bug 1213747", url: "https://bugzilla.suse.com/1213747", }, { category: "self", summary: "SUSE Bug 1213756", url: "https://bugzilla.suse.com/1213756", }, { category: "self", summary: "SUSE Bug 1213759", url: "https://bugzilla.suse.com/1213759", }, { category: "self", summary: "SUSE Bug 1213777", url: "https://bugzilla.suse.com/1213777", }, { category: "self", summary: "SUSE Bug 1213810", url: "https://bugzilla.suse.com/1213810", }, { category: "self", summary: "SUSE Bug 1213812", url: "https://bugzilla.suse.com/1213812", }, { category: "self", summary: "SUSE Bug 1213856", url: "https://bugzilla.suse.com/1213856", }, { category: "self", summary: "SUSE Bug 1213857", url: "https://bugzilla.suse.com/1213857", }, { category: "self", summary: "SUSE Bug 1213863", url: "https://bugzilla.suse.com/1213863", }, { category: "self", summary: "SUSE Bug 1213867", url: "https://bugzilla.suse.com/1213867", }, { category: "self", summary: "SUSE Bug 1213870", url: "https://bugzilla.suse.com/1213870", }, { category: "self", summary: "SUSE Bug 1213871", url: "https://bugzilla.suse.com/1213871", }, { category: "self", summary: "SUSE CVE CVE-2022-40982 page", url: "https://www.suse.com/security/cve/CVE-2022-40982/", }, { category: "self", summary: "SUSE CVE CVE-2023-0459 page", url: "https://www.suse.com/security/cve/CVE-2023-0459/", }, { category: "self", summary: "SUSE CVE CVE-2023-20569 page", url: "https://www.suse.com/security/cve/CVE-2023-20569/", }, { category: "self", summary: "SUSE CVE CVE-2023-21400 page", url: "https://www.suse.com/security/cve/CVE-2023-21400/", }, { category: "self", summary: "SUSE CVE CVE-2023-2156 page", url: "https://www.suse.com/security/cve/CVE-2023-2156/", }, { category: "self", summary: "SUSE CVE CVE-2023-2166 page", url: "https://www.suse.com/security/cve/CVE-2023-2166/", }, { category: "self", summary: "SUSE CVE CVE-2023-31083 page", url: "https://www.suse.com/security/cve/CVE-2023-31083/", }, { category: "self", summary: "SUSE CVE CVE-2023-3268 page", url: "https://www.suse.com/security/cve/CVE-2023-3268/", }, { category: "self", summary: "SUSE CVE CVE-2023-3567 page", url: "https://www.suse.com/security/cve/CVE-2023-3567/", }, { category: "self", summary: "SUSE CVE CVE-2023-3776 page", url: "https://www.suse.com/security/cve/CVE-2023-3776/", }, { category: "self", summary: "SUSE CVE CVE-2023-4004 page", url: "https://www.suse.com/security/cve/CVE-2023-4004/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-08-22T16:34:42Z", generator: { date: "2023-08-22T16:34:42Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:3377-1", initial_release_date: "2023-08-22T16:34:42Z", revision_history: [ { date: "2023-08-22T16:34:42Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", product: { name: "cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", product_id: "cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", product: { name: "dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", product_id: "dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", product: { name: "gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", product_id: "gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-5.14.21-150400.14.63.1.aarch64", product: { name: "kernel-azure-5.14.21-150400.14.63.1.aarch64", product_id: "kernel-azure-5.14.21-150400.14.63.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", product: { name: "kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", product_id: "kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", product: { name: "kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", product_id: "kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", product: { name: "kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", product_id: "kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", product: { name: "kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", product_id: "kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", product: { name: "kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", product_id: "kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", product: { name: "kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", product_id: "kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", product: { name: "ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", product_id: "ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", product: { name: "reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", product_id: "reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-azure-5.14.21-150400.14.63.1.noarch", product: { name: "kernel-devel-azure-5.14.21-150400.14.63.1.noarch", product_id: "kernel-devel-azure-5.14.21-150400.14.63.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-5.14.21-150400.14.63.1.noarch", product: { name: "kernel-source-azure-5.14.21-150400.14.63.1.noarch", product_id: "kernel-source-azure-5.14.21-150400.14.63.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", product: { name: "cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", product_id: "cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", product: { name: "dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", product_id: "dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", product: { name: "gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", product_id: "gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-5.14.21-150400.14.63.1.x86_64", product: { name: "kernel-azure-5.14.21-150400.14.63.1.x86_64", product_id: "kernel-azure-5.14.21-150400.14.63.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", product: { name: "kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", product_id: "kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", product: { name: "kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", product_id: "kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", product: { name: "kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", product_id: "kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", product: { name: "kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", product_id: "kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", product: { name: "kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", product_id: "kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", product: { name: "kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", product_id: "kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", product: { name: "ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", product_id: "ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", product: { name: "reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", product_id: "reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", product: { name: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:15:sp4", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150400.14.63.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", }, product_reference: "kernel-azure-5.14.21-150400.14.63.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150400.14.63.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", }, product_reference: "kernel-azure-5.14.21-150400.14.63.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150400.14.63.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", }, product_reference: "kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150400.14.63.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", }, product_reference: "kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.14.21-150400.14.63.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", }, product_reference: "kernel-devel-azure-5.14.21-150400.14.63.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.14.21-150400.14.63.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", }, product_reference: "kernel-source-azure-5.14.21-150400.14.63.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150400.14.63.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", }, product_reference: "kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150400.14.63.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", }, product_reference: "kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", }, product_reference: "cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", }, product_reference: "cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", }, product_reference: "dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", }, product_reference: "dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", }, product_reference: "gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", }, product_reference: "gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150400.14.63.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", }, product_reference: "kernel-azure-5.14.21-150400.14.63.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150400.14.63.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", }, product_reference: "kernel-azure-5.14.21-150400.14.63.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150400.14.63.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", }, product_reference: "kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150400.14.63.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", }, product_reference: "kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-extra-5.14.21-150400.14.63.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", }, product_reference: "kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-extra-5.14.21-150400.14.63.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", }, product_reference: "kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", }, product_reference: "kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", }, product_reference: "kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-optional-5.14.21-150400.14.63.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", }, product_reference: "kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-optional-5.14.21-150400.14.63.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", }, product_reference: "kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.14.21-150400.14.63.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", }, product_reference: "kernel-devel-azure-5.14.21-150400.14.63.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.14.21-150400.14.63.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", }, product_reference: "kernel-source-azure-5.14.21-150400.14.63.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150400.14.63.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", }, product_reference: "kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150400.14.63.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", }, product_reference: "kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", }, product_reference: "kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", }, product_reference: "kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", }, product_reference: "ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", }, product_reference: "ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", }, product_reference: "reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", }, product_reference: "reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2022-40982", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-40982", }, ], notes: [ { category: "general", text: "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-40982", url: "https://www.suse.com/security/cve/CVE-2022-40982", }, { category: "external", summary: "SUSE Bug 1206418 for CVE-2022-40982", url: "https://bugzilla.suse.com/1206418", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2022-40982", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T16:34:42Z", details: "moderate", }, ], title: "CVE-2022-40982", }, { cve: "CVE-2023-0459", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-0459", }, ], notes: [ { category: "general", text: "Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the \"access_ok\" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-0459", url: "https://www.suse.com/security/cve/CVE-2023-0459", }, { category: "external", summary: "SUSE Bug 1211738 for CVE-2023-0459", url: "https://bugzilla.suse.com/1211738", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-0459", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T16:34:42Z", details: "moderate", }, ], title: "CVE-2023-0459", }, { cve: "CVE-2023-20569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-20569", }, ], notes: [ { category: "general", text: "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-20569", url: "https://www.suse.com/security/cve/CVE-2023-20569", }, { category: "external", summary: "SUSE Bug 1213287 for CVE-2023-20569", url: "https://bugzilla.suse.com/1213287", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T16:34:42Z", details: "moderate", }, ], title: "CVE-2023-20569", }, { cve: "CVE-2023-21400", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-21400", }, ], notes: [ { category: "general", text: "In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-21400", url: "https://www.suse.com/security/cve/CVE-2023-21400", }, { category: "external", summary: "SUSE Bug 1213272 for CVE-2023-21400", url: "https://bugzilla.suse.com/1213272", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T16:34:42Z", details: "moderate", }, ], title: "CVE-2023-21400", }, { cve: "CVE-2023-2156", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2156", }, ], notes: [ { category: "general", text: "A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2156", url: "https://www.suse.com/security/cve/CVE-2023-2156", }, { category: "external", summary: "SUSE Bug 1211131 for CVE-2023-2156", url: "https://bugzilla.suse.com/1211131", }, { category: "external", summary: "SUSE Bug 1211395 for CVE-2023-2156", url: "https://bugzilla.suse.com/1211395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T16:34:42Z", details: "important", }, ], title: "CVE-2023-2156", }, { cve: "CVE-2023-2166", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2166", }, ], notes: [ { category: "general", text: "A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2166", url: "https://www.suse.com/security/cve/CVE-2023-2166", }, { category: "external", summary: "SUSE Bug 1210627 for CVE-2023-2166", url: "https://bugzilla.suse.com/1210627", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T16:34:42Z", details: "moderate", }, ], title: "CVE-2023-2166", }, { cve: "CVE-2023-31083", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-31083", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu->proto is set. A NULL pointer dereference may occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-31083", url: "https://www.suse.com/security/cve/CVE-2023-31083", }, { category: "external", summary: "SUSE Bug 1210780 for CVE-2023-31083", url: "https://bugzilla.suse.com/1210780", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T16:34:42Z", details: "moderate", }, ], title: "CVE-2023-31083", }, { cve: "CVE-2023-3268", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3268", }, ], notes: [ { category: "general", text: "An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3268", url: "https://www.suse.com/security/cve/CVE-2023-3268", }, { category: "external", summary: "SUSE Bug 1212502 for CVE-2023-3268", url: "https://bugzilla.suse.com/1212502", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-3268", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T16:34:42Z", details: "moderate", }, ], title: "CVE-2023-3268", }, { cve: "CVE-2023-3567", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3567", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3567", url: "https://www.suse.com/security/cve/CVE-2023-3567", }, { category: "external", summary: "SUSE Bug 1213167 for CVE-2023-3567", url: "https://bugzilla.suse.com/1213167", }, { category: "external", summary: "SUSE Bug 1213244 for CVE-2023-3567", url: "https://bugzilla.suse.com/1213244", }, { category: "external", summary: "SUSE Bug 1213842 for CVE-2023-3567", url: "https://bugzilla.suse.com/1213842", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-3567", url: "https://bugzilla.suse.com/1215674", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3567", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3567", url: "https://bugzilla.suse.com/1217531", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T16:34:42Z", details: "important", }, ], title: "CVE-2023-3567", }, { cve: "CVE-2023-3776", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3776", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3776", url: "https://www.suse.com/security/cve/CVE-2023-3776", }, { category: "external", summary: "SUSE Bug 1213588 for CVE-2023-3776", url: "https://bugzilla.suse.com/1213588", }, { category: "external", summary: "SUSE Bug 1215119 for CVE-2023-3776", url: "https://bugzilla.suse.com/1215119", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-3776", url: "https://bugzilla.suse.com/1215674", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3776", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3776", url: "https://bugzilla.suse.com/1217531", }, { category: "external", summary: "SUSE Bug 1221578 for CVE-2023-3776", url: "https://bugzilla.suse.com/1221578", }, { category: "external", summary: "SUSE Bug 1221598 for CVE-2023-3776", url: "https://bugzilla.suse.com/1221598", }, { category: "external", summary: "SUSE Bug 1223091 for CVE-2023-3776", url: "https://bugzilla.suse.com/1223091", }, { category: "external", summary: "SUSE Bug 1223973 for CVE-2023-3776", url: "https://bugzilla.suse.com/1223973", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T16:34:42Z", details: "moderate", }, ], title: "CVE-2023-3776", }, { cve: "CVE-2023-4004", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4004", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4004", url: "https://www.suse.com/security/cve/CVE-2023-4004", }, { category: "external", summary: "SUSE Bug 1213812 for CVE-2023-4004", url: "https://bugzilla.suse.com/1213812", }, { category: "external", summary: "SUSE Bug 1214812 for CVE-2023-4004", url: "https://bugzilla.suse.com/1214812", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.63.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.63.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.63.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T16:34:42Z", details: "important", }, ], title: "CVE-2023-4004", }, ], }
suse-su-2023:3684-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-36402: Fixed an integer overflow vulnerability in vmwgfx driver in that allowed a local attacker with a user account on the system to gain privilege, causing a denial of service (bsc#1203517).\n- CVE-2023-2007: Fixed a flaw in the DPT I2O Controller driver that could allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel (bsc#1210448).\n- CVE-2023-3772: Fixed a flaw in XFRM subsystem that may have allowed a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer leading to a possible kernel crash and denial of service (bsc#1213666).\n- CVE-2023-3863: Fixed a use-after-free flaw was found in nfc_llcp_find_local that allowed a local user with special privileges to impact a kernel information leak issue (bsc#1213601).\n- CVE-2023-4128: Fixed a use-after-free flaw in net/sched/cls_fw.c that allowed a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue (bsc#1214149).\n- CVE-2023-4132: Fixed use-after-free vulnerability was found in the siano smsusb module that allowed a local user to crash the system, causing a denial of service condition (bsc#1213969).\n- CVE-2023-4133: Fixed use after free bugs caused by circular dependency problem in cxgb4 (bsc#1213970).\n- CVE-2023-4134: Fixed use-after-free in cyttsp4_watchdog_work() (bsc#1213971).\n- CVE-2023-4147: Fixed use-after-free in nf_tables_newrule (bsc#1213968).\n- CVE-2023-4194: Fixed a type confusion in net tun_chr_open() (bsc#1214019).\n- CVE-2023-4273: Fixed a flaw in the exFAT driver of the Linux kernel that alloawed a local privileged attacker to overflow the kernel stack (bsc#1214120).\n- CVE-2023-4385: Fixed a NULL pointer dereference flaw in dbFree that may have allowed a local attacker to crash the system due to a missing sanity check (bsc#1214348).\n- CVE-2023-4387: Fixed use-after-free flaw in vmxnet3_rq_alloc_rx_buf that could allow a local attacker to crash the system due to a double-free (bsc#1214350).\n- CVE-2023-4459: Fixed a NULL pointer dereference flaw in vmxnet3_rq_cleanup that may have allowed a local attacker with normal user privilege to cause a denial of service (bsc#1214451).\n- CVE-2023-20588: Fixed a division-by-zero error on some AMD processors that can potentially return speculative data resulting in loss of confidentiality (bsc#1213927).\n- CVE-2023-21400: Fixed several memory corruptions due to improper locking in io_uring (bsc#1213272).\n- CVE-2023-34319: Fixed buffer overrun triggered by unusual packet in xen/netback (XSA-432) (bsc#1213546).\n\nThe following non-security bugs were fixed:\n\n- ARM: spear: Do not use timer namespace for timer_shutdown() function (bsc#1213970).\n- Do not add and remove genksyms ifdefs\n- clocksource/drivers/arm_arch_timer: Do not use timer namespace for timer_shutdown() function (bsc#1213970).\n- clocksource/drivers/sp804: Do not use timer namespace for timer_shutdown() function (bsc#1213970).\n- e1000: Fix fall-through warnings for Clang (jsc#PED-5738).\n- e1000: Fix typos in comments (jsc#PED-5738).\n- e1000: Remove unnecessary use of kmap_atomic() (jsc#PED-5738).\n- e1000: drop unneeded assignment in e1000_set_itr() (jsc#PED-5738).\n- e1000: switch to napi_consume_skb() (jsc#PED-5738).\n- intel/e1000:fix repeated words in comments (jsc#PED-5738).\n- intel: remove checker warning (jsc#PED-5738).\n- kabi/severities: Ignore newly added SRSO mitigation functions\n- md/raid0: Factor out helper for mapping and submitting a bio (bsc#1213916).\n- md/raid0: Fix performance regression for large sequential writes (bsc#1213916).\n- net: e1000: remove repeated word 'slot' for e1000_main.c (jsc#PED-5738).\n- net: e1000: remove repeated words for e1000_hw.c (jsc#PED-5738).\n- powerpc/rtas: block error injection when locked down (bsc#1023051).\n- powerpc/rtas: mandate RTAS syscall filtering (bsc#1023051).\n- powerpc/rtas: move syscall filter setup into separate function (bsc#1023051).\n- powerpc/rtas: remove ibm_suspend_me_token (bsc#1023051).\n- powerpc: Move DMA64_PROPNAME define to a header (bsc#1214297 ltc#197503).\n- pseries/iommu/ddw: Fix kdump to work in absence of ibm,dma-window (bsc#1214297 ltc#197503).\n- timers: Add shutdown mechanism to the internal functions (bsc#1213970).\n- timers: Provide timer_shutdown[_sync]() (bsc#1213970).\n- timers: Rename del_timer() to timer_delete() (bsc#1213970).\n- timers: Rename del_timer_sync() to timer_delete_sync() (bsc#1213970).\n- timers: Replace BUG_ON()s (bsc#1213970).\n- timers: Silently ignore timers with a NULL function (bsc#1213970).\n- timers: Split [try_to_]del_timer[_sync]() to prepare for shutdown mode (bsc#1213970).\n- timers: Update kernel-doc for various functions (bsc#1213970).\n- timers: Use del_timer_sync() even on UP (bsc#1213970).\n- x86/cpu/kvm: Provide UNTRAIN_RET_VM (git-fixes).\n- x86/cpu: Cleanup the untrain mess (git-fixes).\n- x86/cpu: Rename original retbleed methods (git-fixes).\n- x86/cpu: Rename srso_(.*)_alias to srso_alias_\\1 (git-fixes).\n- x86/retpoline: Do not clobber RFLAGS during srso_safe_ret() (git-fixes).\n- x86/speculation: Add cpu_show_gds() prototype (git-fixes).\n- x86/speculation: Mark all Skylake CPUs as vulnerable to GDS (git-fixes).\n- x86/srso: Correct the mitigation status when SMT is disabled (git-fixes).\n- x86/srso: Disable the mitigation on unaffected configurations (git-fixes).\n- x86/srso: Explain the untraining sequences a bit more (git-fixes).\n- x86: Move gds_ucode_mitigated() declaration to header (git-fixes).\n- xfs: fix sb write verify for lazysbcount (bsc#1214275).\n- xfs: gut error handling in xfs_trans_unreserve_and_mod_sb() (bsc#1214275).\n- xfs: update superblock counters correctly for !lazysbcount (bsc#1214275).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-3684,SUSE-SLE-Module-Live-Patching-15-SP3-2023-3684,SUSE-SLE-Product-HA-15-SP3-2023-3684,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3684,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3684,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3684,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3684,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3684,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3684,SUSE-SUSE-MicroOS-5.1-2023-3684,SUSE-SUSE-MicroOS-5.2-2023-3684,SUSE-Storage-7.1-2023-3684,openSUSE-SLE-15.4-2023-3684", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3684-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:3684-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20233684-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:3684-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html", }, { category: "self", summary: "SUSE Bug 1023051", url: "https://bugzilla.suse.com/1023051", }, { category: "self", summary: "SUSE Bug 1203517", url: "https://bugzilla.suse.com/1203517", }, { category: "self", summary: "SUSE Bug 1210448", url: "https://bugzilla.suse.com/1210448", }, { category: "self", summary: "SUSE Bug 1213272", url: "https://bugzilla.suse.com/1213272", }, { category: "self", summary: "SUSE Bug 1213546", url: "https://bugzilla.suse.com/1213546", }, { category: "self", summary: "SUSE Bug 1213601", url: "https://bugzilla.suse.com/1213601", }, { category: "self", summary: "SUSE Bug 1213666", url: "https://bugzilla.suse.com/1213666", }, { category: "self", summary: "SUSE Bug 1213916", url: "https://bugzilla.suse.com/1213916", }, { category: "self", summary: "SUSE Bug 1213927", url: "https://bugzilla.suse.com/1213927", }, { category: "self", summary: "SUSE Bug 1213968", url: "https://bugzilla.suse.com/1213968", }, { category: "self", summary: "SUSE Bug 1213969", url: "https://bugzilla.suse.com/1213969", }, { category: "self", summary: "SUSE Bug 1213970", url: "https://bugzilla.suse.com/1213970", }, { category: "self", summary: "SUSE Bug 1213971", url: "https://bugzilla.suse.com/1213971", }, { category: "self", summary: "SUSE Bug 1214019", url: "https://bugzilla.suse.com/1214019", }, { category: "self", summary: "SUSE Bug 1214120", url: "https://bugzilla.suse.com/1214120", }, { category: "self", summary: "SUSE Bug 1214149", url: "https://bugzilla.suse.com/1214149", }, { category: "self", summary: "SUSE Bug 1214275", url: "https://bugzilla.suse.com/1214275", }, { category: "self", summary: "SUSE Bug 1214297", url: "https://bugzilla.suse.com/1214297", }, { category: "self", summary: "SUSE Bug 1214348", url: "https://bugzilla.suse.com/1214348", }, { category: "self", summary: "SUSE Bug 1214350", url: "https://bugzilla.suse.com/1214350", }, { category: "self", summary: "SUSE Bug 1214451", url: "https://bugzilla.suse.com/1214451", }, { category: "self", summary: "SUSE CVE CVE-2022-36402 page", url: "https://www.suse.com/security/cve/CVE-2022-36402/", }, { category: "self", summary: "SUSE CVE CVE-2023-2007 page", url: "https://www.suse.com/security/cve/CVE-2023-2007/", }, { category: "self", summary: "SUSE CVE CVE-2023-20588 page", url: "https://www.suse.com/security/cve/CVE-2023-20588/", }, { category: "self", summary: "SUSE CVE CVE-2023-21400 page", url: "https://www.suse.com/security/cve/CVE-2023-21400/", }, { category: "self", summary: "SUSE CVE CVE-2023-34319 page", url: "https://www.suse.com/security/cve/CVE-2023-34319/", }, { category: "self", summary: "SUSE CVE CVE-2023-3772 page", url: "https://www.suse.com/security/cve/CVE-2023-3772/", }, { category: "self", summary: "SUSE CVE CVE-2023-3863 page", url: "https://www.suse.com/security/cve/CVE-2023-3863/", }, { category: "self", summary: "SUSE CVE CVE-2023-4128 page", url: "https://www.suse.com/security/cve/CVE-2023-4128/", }, { category: "self", summary: "SUSE CVE CVE-2023-4132 page", url: "https://www.suse.com/security/cve/CVE-2023-4132/", }, { category: "self", summary: "SUSE CVE CVE-2023-4133 page", url: "https://www.suse.com/security/cve/CVE-2023-4133/", }, { category: "self", summary: "SUSE CVE CVE-2023-4134 page", url: "https://www.suse.com/security/cve/CVE-2023-4134/", }, { category: "self", summary: "SUSE CVE CVE-2023-4147 page", url: "https://www.suse.com/security/cve/CVE-2023-4147/", }, { category: "self", summary: "SUSE CVE CVE-2023-4194 page", url: "https://www.suse.com/security/cve/CVE-2023-4194/", }, { category: "self", summary: "SUSE CVE CVE-2023-4273 page", url: "https://www.suse.com/security/cve/CVE-2023-4273/", }, { category: "self", summary: "SUSE CVE CVE-2023-4385 page", url: "https://www.suse.com/security/cve/CVE-2023-4385/", }, { category: "self", summary: "SUSE CVE CVE-2023-4387 page", url: "https://www.suse.com/security/cve/CVE-2023-4387/", }, { category: "self", summary: "SUSE CVE CVE-2023-4459 page", url: "https://www.suse.com/security/cve/CVE-2023-4459/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-09-19T15:12:25Z", generator: { date: "2023-09-19T15:12:25Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:3684-1", initial_release_date: "2023-09-19T15:12:25Z", revision_history: [ { date: "2023-09-19T15:12:25Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-64kb-5.3.18-150300.59.133.1.aarch64", product: { name: "cluster-md-kmp-64kb-5.3.18-150300.59.133.1.aarch64", product_id: "cluster-md-kmp-64kb-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", product_id: "cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-150300.59.133.1.aarch64", product: { name: "cluster-md-kmp-preempt-5.3.18-150300.59.133.1.aarch64", product_id: "cluster-md-kmp-preempt-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-64kb-5.3.18-150300.59.133.1.aarch64", product: { name: "dlm-kmp-64kb-5.3.18-150300.59.133.1.aarch64", product_id: "dlm-kmp-64kb-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", product: { name: "dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", product_id: "dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-150300.59.133.1.aarch64", product: { name: "dlm-kmp-preempt-5.3.18-150300.59.133.1.aarch64", product_id: "dlm-kmp-preempt-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dtb-al-5.3.18-150300.59.133.1.aarch64", product: { name: "dtb-al-5.3.18-150300.59.133.1.aarch64", product_id: "dtb-al-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dtb-allwinner-5.3.18-150300.59.133.1.aarch64", product: { name: "dtb-allwinner-5.3.18-150300.59.133.1.aarch64", product_id: "dtb-allwinner-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dtb-altera-5.3.18-150300.59.133.1.aarch64", product: { name: "dtb-altera-5.3.18-150300.59.133.1.aarch64", product_id: "dtb-altera-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dtb-amd-5.3.18-150300.59.133.1.aarch64", product: { name: "dtb-amd-5.3.18-150300.59.133.1.aarch64", product_id: "dtb-amd-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dtb-amlogic-5.3.18-150300.59.133.1.aarch64", product: { name: "dtb-amlogic-5.3.18-150300.59.133.1.aarch64", product_id: "dtb-amlogic-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dtb-apm-5.3.18-150300.59.133.1.aarch64", product: { name: "dtb-apm-5.3.18-150300.59.133.1.aarch64", product_id: "dtb-apm-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dtb-arm-5.3.18-150300.59.133.1.aarch64", product: { name: "dtb-arm-5.3.18-150300.59.133.1.aarch64", product_id: "dtb-arm-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dtb-broadcom-5.3.18-150300.59.133.1.aarch64", product: { name: "dtb-broadcom-5.3.18-150300.59.133.1.aarch64", product_id: "dtb-broadcom-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dtb-cavium-5.3.18-150300.59.133.1.aarch64", product: { name: "dtb-cavium-5.3.18-150300.59.133.1.aarch64", product_id: "dtb-cavium-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dtb-exynos-5.3.18-150300.59.133.1.aarch64", product: { name: "dtb-exynos-5.3.18-150300.59.133.1.aarch64", product_id: "dtb-exynos-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dtb-freescale-5.3.18-150300.59.133.1.aarch64", product: { name: "dtb-freescale-5.3.18-150300.59.133.1.aarch64", product_id: "dtb-freescale-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dtb-hisilicon-5.3.18-150300.59.133.1.aarch64", product: { name: "dtb-hisilicon-5.3.18-150300.59.133.1.aarch64", product_id: "dtb-hisilicon-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dtb-lg-5.3.18-150300.59.133.1.aarch64", product: { name: "dtb-lg-5.3.18-150300.59.133.1.aarch64", product_id: "dtb-lg-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dtb-marvell-5.3.18-150300.59.133.1.aarch64", product: { name: "dtb-marvell-5.3.18-150300.59.133.1.aarch64", product_id: "dtb-marvell-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dtb-mediatek-5.3.18-150300.59.133.1.aarch64", product: { name: "dtb-mediatek-5.3.18-150300.59.133.1.aarch64", product_id: "dtb-mediatek-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dtb-nvidia-5.3.18-150300.59.133.1.aarch64", product: { name: "dtb-nvidia-5.3.18-150300.59.133.1.aarch64", product_id: "dtb-nvidia-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dtb-qcom-5.3.18-150300.59.133.1.aarch64", product: { name: "dtb-qcom-5.3.18-150300.59.133.1.aarch64", product_id: "dtb-qcom-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dtb-renesas-5.3.18-150300.59.133.1.aarch64", product: { name: "dtb-renesas-5.3.18-150300.59.133.1.aarch64", product_id: "dtb-renesas-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dtb-rockchip-5.3.18-150300.59.133.1.aarch64", product: { name: "dtb-rockchip-5.3.18-150300.59.133.1.aarch64", product_id: "dtb-rockchip-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dtb-socionext-5.3.18-150300.59.133.1.aarch64", product: { name: "dtb-socionext-5.3.18-150300.59.133.1.aarch64", product_id: "dtb-socionext-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dtb-sprd-5.3.18-150300.59.133.1.aarch64", product: { name: "dtb-sprd-5.3.18-150300.59.133.1.aarch64", product_id: "dtb-sprd-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dtb-xilinx-5.3.18-150300.59.133.1.aarch64", product: { name: "dtb-xilinx-5.3.18-150300.59.133.1.aarch64", product_id: "dtb-xilinx-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "dtb-zte-5.3.18-150300.59.133.1.aarch64", product: { name: "dtb-zte-5.3.18-150300.59.133.1.aarch64", product_id: "dtb-zte-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-64kb-5.3.18-150300.59.133.1.aarch64", product: { name: "gfs2-kmp-64kb-5.3.18-150300.59.133.1.aarch64", product_id: "gfs2-kmp-64kb-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", product: { name: "gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", product_id: "gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-150300.59.133.1.aarch64", product: { name: "gfs2-kmp-preempt-5.3.18-150300.59.133.1.aarch64", product_id: "gfs2-kmp-preempt-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-5.3.18-150300.59.133.1.aarch64", product: { name: "kernel-64kb-5.3.18-150300.59.133.1.aarch64", product_id: "kernel-64kb-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", product: { name: "kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", product_id: "kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-extra-5.3.18-150300.59.133.1.aarch64", product: { name: "kernel-64kb-extra-5.3.18-150300.59.133.1.aarch64", product_id: "kernel-64kb-extra-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-livepatch-devel-5.3.18-150300.59.133.1.aarch64", product: { name: "kernel-64kb-livepatch-devel-5.3.18-150300.59.133.1.aarch64", product_id: "kernel-64kb-livepatch-devel-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-optional-5.3.18-150300.59.133.1.aarch64", product: { name: "kernel-64kb-optional-5.3.18-150300.59.133.1.aarch64", product_id: "kernel-64kb-optional-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.133.1.aarch64", product: { name: "kernel-default-5.3.18-150300.59.133.1.aarch64", product_id: "kernel-default-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", product: { name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", product_id: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.133.1.aarch64", product: { name: "kernel-default-devel-5.3.18-150300.59.133.1.aarch64", product_id: "kernel-default-devel-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.133.1.aarch64", product: { name: "kernel-default-extra-5.3.18-150300.59.133.1.aarch64", product_id: "kernel-default-extra-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.133.1.aarch64", product: { name: "kernel-default-livepatch-5.3.18-150300.59.133.1.aarch64", product_id: "kernel-default-livepatch-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.133.1.aarch64", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.133.1.aarch64", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.133.1.aarch64", product: { name: "kernel-default-optional-5.3.18-150300.59.133.1.aarch64", product_id: "kernel-default-optional-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.133.1.aarch64", product: { name: "kernel-obs-build-5.3.18-150300.59.133.1.aarch64", product_id: "kernel-obs-build-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.133.1.aarch64", product: { name: "kernel-obs-qa-5.3.18-150300.59.133.1.aarch64", product_id: "kernel-obs-qa-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-150300.59.133.1.aarch64", product: { name: "kernel-preempt-5.3.18-150300.59.133.1.aarch64", product_id: "kernel-preempt-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", product: { name: "kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", product_id: "kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-150300.59.133.1.aarch64", product: { name: "kernel-preempt-extra-5.3.18-150300.59.133.1.aarch64", product_id: "kernel-preempt-extra-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.133.1.aarch64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.133.1.aarch64", product_id: "kernel-preempt-livepatch-devel-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-optional-5.3.18-150300.59.133.1.aarch64", product: { name: "kernel-preempt-optional-5.3.18-150300.59.133.1.aarch64", product_id: "kernel-preempt-optional-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.133.1.aarch64", product: { name: "kernel-syms-5.3.18-150300.59.133.1.aarch64", product_id: "kernel-syms-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-64kb-5.3.18-150300.59.133.1.aarch64", product: { name: "kselftests-kmp-64kb-5.3.18-150300.59.133.1.aarch64", product_id: "kselftests-kmp-64kb-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.133.1.aarch64", product: { name: "kselftests-kmp-default-5.3.18-150300.59.133.1.aarch64", product_id: "kselftests-kmp-default-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-150300.59.133.1.aarch64", product: { name: "kselftests-kmp-preempt-5.3.18-150300.59.133.1.aarch64", product_id: "kselftests-kmp-preempt-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-64kb-5.3.18-150300.59.133.1.aarch64", product: { name: "ocfs2-kmp-64kb-5.3.18-150300.59.133.1.aarch64", product_id: "ocfs2-kmp-64kb-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", product_id: "ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-150300.59.133.1.aarch64", product: { name: "ocfs2-kmp-preempt-5.3.18-150300.59.133.1.aarch64", product_id: "ocfs2-kmp-preempt-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-64kb-5.3.18-150300.59.133.1.aarch64", product: { name: "reiserfs-kmp-64kb-5.3.18-150300.59.133.1.aarch64", product_id: "reiserfs-kmp-64kb-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", product_id: "reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-150300.59.133.1.aarch64", product: { name: "reiserfs-kmp-preempt-5.3.18-150300.59.133.1.aarch64", product_id: "reiserfs-kmp-preempt-5.3.18-150300.59.133.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-5.3.18-150300.59.133.1.noarch", product: { name: "kernel-devel-5.3.18-150300.59.133.1.noarch", product_id: "kernel-devel-5.3.18-150300.59.133.1.noarch", }, }, { category: "product_version", name: "kernel-docs-5.3.18-150300.59.133.1.noarch", product: { name: "kernel-docs-5.3.18-150300.59.133.1.noarch", product_id: "kernel-docs-5.3.18-150300.59.133.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-5.3.18-150300.59.133.1.noarch", product: { name: "kernel-docs-html-5.3.18-150300.59.133.1.noarch", product_id: "kernel-docs-html-5.3.18-150300.59.133.1.noarch", }, }, { category: "product_version", name: "kernel-macros-5.3.18-150300.59.133.1.noarch", product: { name: "kernel-macros-5.3.18-150300.59.133.1.noarch", product_id: "kernel-macros-5.3.18-150300.59.133.1.noarch", }, }, { category: "product_version", name: "kernel-source-5.3.18-150300.59.133.1.noarch", product: { name: "kernel-source-5.3.18-150300.59.133.1.noarch", product_id: "kernel-source-5.3.18-150300.59.133.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-5.3.18-150300.59.133.1.noarch", product: { name: "kernel-source-vanilla-5.3.18-150300.59.133.1.noarch", product_id: "kernel-source-vanilla-5.3.18-150300.59.133.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", product_id: "cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", product: { name: "dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", product_id: "dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", product: { name: "gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", product_id: "gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-5.3.18-150300.59.133.1.ppc64le", product: { name: "kernel-debug-5.3.18-150300.59.133.1.ppc64le", product_id: "kernel-debug-5.3.18-150300.59.133.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-150300.59.133.1.ppc64le", product: { name: "kernel-debug-devel-5.3.18-150300.59.133.1.ppc64le", product_id: "kernel-debug-devel-5.3.18-150300.59.133.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", product: { name: "kernel-debug-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", product_id: "kernel-debug-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.133.1.ppc64le", product: { name: "kernel-default-5.3.18-150300.59.133.1.ppc64le", product_id: "kernel-default-5.3.18-150300.59.133.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", product: { name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", product_id: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", product: { name: "kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", product_id: "kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.133.1.ppc64le", product: { name: "kernel-default-extra-5.3.18-150300.59.133.1.ppc64le", product_id: "kernel-default-extra-5.3.18-150300.59.133.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", product: { name: "kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", product_id: "kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.133.1.ppc64le", product: { name: "kernel-default-optional-5.3.18-150300.59.133.1.ppc64le", product_id: "kernel-default-optional-5.3.18-150300.59.133.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-150300.59.133.1.ppc64le", product: { name: "kernel-kvmsmall-5.3.18-150300.59.133.1.ppc64le", product_id: "kernel-kvmsmall-5.3.18-150300.59.133.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-150300.59.133.1.ppc64le", product: { name: "kernel-kvmsmall-devel-5.3.18-150300.59.133.1.ppc64le", product_id: "kernel-kvmsmall-devel-5.3.18-150300.59.133.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", product: { name: "kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", product_id: "kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", product: { name: "kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", product_id: "kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.133.1.ppc64le", product: { name: "kernel-obs-qa-5.3.18-150300.59.133.1.ppc64le", product_id: "kernel-obs-qa-5.3.18-150300.59.133.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.133.1.ppc64le", product: { name: "kernel-syms-5.3.18-150300.59.133.1.ppc64le", product_id: "kernel-syms-5.3.18-150300.59.133.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.133.1.ppc64le", product: { name: "kselftests-kmp-default-5.3.18-150300.59.133.1.ppc64le", product_id: "kselftests-kmp-default-5.3.18-150300.59.133.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", product_id: "ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", product_id: "reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", product_id: "cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.133.1.s390x", product: { name: "dlm-kmp-default-5.3.18-150300.59.133.1.s390x", product_id: "dlm-kmp-default-5.3.18-150300.59.133.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", product: { name: "gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", product_id: "gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.133.1.s390x", product: { name: "kernel-default-5.3.18-150300.59.133.1.s390x", product_id: "kernel-default-5.3.18-150300.59.133.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", product: { name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", product_id: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.133.1.150300.18.78.1.s390x", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.133.1.150300.18.78.1.s390x", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.133.1.150300.18.78.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.133.1.s390x", product: { name: "kernel-default-devel-5.3.18-150300.59.133.1.s390x", product_id: "kernel-default-devel-5.3.18-150300.59.133.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.133.1.s390x", product: { name: "kernel-default-extra-5.3.18-150300.59.133.1.s390x", product_id: "kernel-default-extra-5.3.18-150300.59.133.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", product: { name: "kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", product_id: "kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.133.1.s390x", product: { name: "kernel-default-optional-5.3.18-150300.59.133.1.s390x", product_id: "kernel-default-optional-5.3.18-150300.59.133.1.s390x", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", product: { name: "kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", product_id: "kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.133.1.s390x", product: { name: "kernel-obs-build-5.3.18-150300.59.133.1.s390x", product_id: "kernel-obs-build-5.3.18-150300.59.133.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.133.1.s390x", product: { name: "kernel-obs-qa-5.3.18-150300.59.133.1.s390x", product_id: "kernel-obs-qa-5.3.18-150300.59.133.1.s390x", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.133.1.s390x", product: { name: "kernel-syms-5.3.18-150300.59.133.1.s390x", product_id: "kernel-syms-5.3.18-150300.59.133.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", product: { name: "kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", product_id: "kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.133.1.s390x", product: { name: "kselftests-kmp-default-5.3.18-150300.59.133.1.s390x", product_id: "kselftests-kmp-default-5.3.18-150300.59.133.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", product_id: "ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", product_id: "reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", product: { name: "cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", product_id: "cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-150300.59.133.1.x86_64", product: { name: "cluster-md-kmp-preempt-5.3.18-150300.59.133.1.x86_64", product_id: "cluster-md-kmp-preempt-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", product: { name: "dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", product_id: "dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-150300.59.133.1.x86_64", product: { name: "dlm-kmp-preempt-5.3.18-150300.59.133.1.x86_64", product_id: "dlm-kmp-preempt-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", product: { name: "gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", product_id: "gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-150300.59.133.1.x86_64", product: { name: "gfs2-kmp-preempt-5.3.18-150300.59.133.1.x86_64", product_id: "gfs2-kmp-preempt-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-5.3.18-150300.59.133.1.x86_64", product: { name: "kernel-debug-5.3.18-150300.59.133.1.x86_64", product_id: "kernel-debug-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-150300.59.133.1.x86_64", product: { name: "kernel-debug-devel-5.3.18-150300.59.133.1.x86_64", product_id: "kernel-debug-devel-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-150300.59.133.1.x86_64", product: { name: "kernel-debug-livepatch-devel-5.3.18-150300.59.133.1.x86_64", product_id: "kernel-debug-livepatch-devel-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "kernel-default-5.3.18-150300.59.133.1.x86_64", product: { name: "kernel-default-5.3.18-150300.59.133.1.x86_64", product_id: "kernel-default-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", product: { name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", product_id: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", product: { name: "kernel-default-base-rebuild-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", product_id: "kernel-default-base-rebuild-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150300.59.133.1.x86_64", product: { name: "kernel-default-devel-5.3.18-150300.59.133.1.x86_64", product_id: "kernel-default-devel-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150300.59.133.1.x86_64", product: { name: "kernel-default-extra-5.3.18-150300.59.133.1.x86_64", product_id: "kernel-default-extra-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", product: { name: "kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", product_id: "kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", product: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", product_id: "kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "kernel-default-optional-5.3.18-150300.59.133.1.x86_64", product: { name: "kernel-default-optional-5.3.18-150300.59.133.1.x86_64", product_id: "kernel-default-optional-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-150300.59.133.1.x86_64", product: { name: "kernel-kvmsmall-5.3.18-150300.59.133.1.x86_64", product_id: "kernel-kvmsmall-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-150300.59.133.1.x86_64", product: { name: "kernel-kvmsmall-devel-5.3.18-150300.59.133.1.x86_64", product_id: "kernel-kvmsmall-devel-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.133.1.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.133.1.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", product: { name: "kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", product_id: "kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_133-preempt-1-150300.7.3.1.x86_64", product: { name: "kernel-livepatch-5_3_18-150300_59_133-preempt-1-150300.7.3.1.x86_64", product_id: "kernel-livepatch-5_3_18-150300_59_133-preempt-1-150300.7.3.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150300.59.133.1.x86_64", product: { name: "kernel-obs-build-5.3.18-150300.59.133.1.x86_64", product_id: "kernel-obs-build-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150300.59.133.1.x86_64", product: { name: "kernel-obs-qa-5.3.18-150300.59.133.1.x86_64", product_id: "kernel-obs-qa-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-150300.59.133.1.x86_64", product: { name: "kernel-preempt-5.3.18-150300.59.133.1.x86_64", product_id: "kernel-preempt-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", product: { name: "kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", product_id: "kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-150300.59.133.1.x86_64", product: { name: "kernel-preempt-extra-5.3.18-150300.59.133.1.x86_64", product_id: "kernel-preempt-extra-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.133.1.x86_64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-150300.59.133.1.x86_64", product_id: "kernel-preempt-livepatch-devel-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-optional-5.3.18-150300.59.133.1.x86_64", product: { name: "kernel-preempt-optional-5.3.18-150300.59.133.1.x86_64", product_id: "kernel-preempt-optional-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150300.59.133.1.x86_64", product: { name: "kernel-syms-5.3.18-150300.59.133.1.x86_64", product_id: "kernel-syms-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150300.59.133.1.x86_64", product: { name: "kselftests-kmp-default-5.3.18-150300.59.133.1.x86_64", product_id: "kselftests-kmp-default-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-150300.59.133.1.x86_64", product: { name: "kselftests-kmp-preempt-5.3.18-150300.59.133.1.x86_64", product_id: "kselftests-kmp-preempt-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", product: { name: "ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", product_id: "ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-150300.59.133.1.x86_64", product: { name: "ocfs2-kmp-preempt-5.3.18-150300.59.133.1.x86_64", product_id: "ocfs2-kmp-preempt-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", product: { name: "reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", product_id: "reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-150300.59.133.1.x86_64", product: { name: "reiserfs-kmp-preempt-5.3.18-150300.59.133.1.x86_64", product_id: "reiserfs-kmp-preempt-5.3.18-150300.59.133.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP3", product: { name: "SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15 SP3", product: { name: "SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp3", }, }, }, { category: "product_name", name: "SUSE Manager Proxy 4.2", product: { name: "SUSE Manager Proxy 4.2", product_id: "SUSE Manager Proxy 4.2", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-proxy:4.2", }, }, }, { category: "product_name", name: "SUSE Manager Server 4.2", product: { name: "SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-server:4.2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.1", product: { name: "SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.2", product: { name: "SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.2", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 7.1", product: { name: "SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1", product_identification_helper: { cpe: "cpe:/o:suse:ses:7.1", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.133.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", }, product_reference: "kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", }, product_reference: "kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", }, product_reference: "kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", }, product_reference: "cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.133.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.133.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", }, product_reference: "dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.133.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", }, product_reference: "gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", }, product_reference: "ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-64kb-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-default-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150300.59.133.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", }, product_reference: "kernel-devel-5.3.18-150300.59.133.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150300.59.133.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", }, product_reference: "kernel-docs-5.3.18-150300.59.133.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150300.59.133.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", }, product_reference: "kernel-macros-5.3.18-150300.59.133.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150300.59.133.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", }, product_reference: "kernel-source-5.3.18-150300.59.133.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-syms-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-64kb-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-default-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150300.59.133.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", }, product_reference: "kernel-devel-5.3.18-150300.59.133.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150300.59.133.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", }, product_reference: "kernel-docs-5.3.18-150300.59.133.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150300.59.133.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", }, product_reference: "kernel-macros-5.3.18-150300.59.133.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150300.59.133.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", }, product_reference: "kernel-source-5.3.18-150300.59.133.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-syms-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-64kb-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-default-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.133.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", }, product_reference: "kernel-default-5.3.18-150300.59.133.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.133.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", }, product_reference: "kernel-default-5.3.18-150300.59.133.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", }, product_reference: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", }, product_reference: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.133.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", }, product_reference: "kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.133.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", }, product_reference: "kernel-default-devel-5.3.18-150300.59.133.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150300.59.133.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", }, product_reference: "kernel-devel-5.3.18-150300.59.133.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150300.59.133.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", }, product_reference: "kernel-docs-5.3.18-150300.59.133.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150300.59.133.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", }, product_reference: "kernel-macros-5.3.18-150300.59.133.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.133.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", }, product_reference: "kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.133.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", }, product_reference: "kernel-obs-build-5.3.18-150300.59.133.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150300.59.133.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", }, product_reference: "kernel-source-5.3.18-150300.59.133.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-syms-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.133.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", }, product_reference: "kernel-syms-5.3.18-150300.59.133.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.133.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", }, product_reference: "kernel-syms-5.3.18-150300.59.133.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-5.3.18-150300.59.133.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", }, product_reference: "kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.133.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", }, product_reference: "kernel-default-5.3.18-150300.59.133.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", }, product_reference: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.133.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", }, product_reference: "kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150300.59.133.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", }, product_reference: "kernel-devel-5.3.18-150300.59.133.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150300.59.133.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", }, product_reference: "kernel-docs-5.3.18-150300.59.133.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150300.59.133.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", }, product_reference: "kernel-macros-5.3.18-150300.59.133.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.133.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", }, product_reference: "kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150300.59.133.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", }, product_reference: "kernel-source-5.3.18-150300.59.133.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.133.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", }, product_reference: "kernel-syms-5.3.18-150300.59.133.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.133.1.x86_64 as component of SUSE Manager Proxy 4.2", product_id: "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64 as component of SUSE Manager Proxy 4.2", product_id: "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.133.1.x86_64 as component of SUSE Manager Proxy 4.2", product_id: "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.2", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150300.59.133.1.noarch as component of SUSE Manager Proxy 4.2", product_id: "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", }, product_reference: "kernel-devel-5.3.18-150300.59.133.1.noarch", relates_to_product_reference: "SUSE Manager Proxy 4.2", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150300.59.133.1.noarch as component of SUSE Manager Proxy 4.2", product_id: "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", }, product_reference: "kernel-macros-5.3.18-150300.59.133.1.noarch", relates_to_product_reference: "SUSE Manager Proxy 4.2", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.133.1.x86_64 as component of SUSE Manager Proxy 4.2", product_id: "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.133.1.ppc64le as component of SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", }, product_reference: "kernel-default-5.3.18-150300.59.133.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.133.1.s390x as component of SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", }, product_reference: "kernel-default-5.3.18-150300.59.133.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.133.1.x86_64 as component of SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le as component of SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", }, product_reference: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x as component of SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", }, product_reference: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64 as component of SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.133.1.ppc64le as component of SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", }, product_reference: "kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.133.1.s390x as component of SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", }, product_reference: "kernel-default-devel-5.3.18-150300.59.133.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.133.1.x86_64 as component of SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.2", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150300.59.133.1.noarch as component of SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", }, product_reference: "kernel-devel-5.3.18-150300.59.133.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.2", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150300.59.133.1.noarch as component of SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", }, product_reference: "kernel-macros-5.3.18-150300.59.133.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.2", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.133.1.x86_64 as component of SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.2", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-5.3.18-150300.59.133.1.s390x as component of SUSE Manager Server 4.2", product_id: "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", }, product_reference: "kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-default-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.133.1.s390x as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", }, product_reference: "kernel-default-5.3.18-150300.59.133.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", }, product_reference: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.133.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-default-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.133.1.s390x as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", }, product_reference: "kernel-default-5.3.18-150300.59.133.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.133.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.3.18-150300.59.133.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-64kb-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.133.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-default-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150300.59.133.1.x86_64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-default-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.133.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150300.59.133.1.x86_64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150300.59.133.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", }, product_reference: "kernel-devel-5.3.18-150300.59.133.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150300.59.133.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", }, product_reference: "kernel-docs-5.3.18-150300.59.133.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150300.59.133.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", }, product_reference: "kernel-macros-5.3.18-150300.59.133.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.133.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150300.59.133.1.x86_64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.133.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150300.59.133.1.x86_64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150300.59.133.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", }, product_reference: "kernel-source-5.3.18-150300.59.133.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.133.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", }, product_reference: "kernel-syms-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150300.59.133.1.x86_64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64 as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "dtb-al-5.3.18-150300.59.133.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", }, product_reference: "dtb-al-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-zte-5.3.18-150300.59.133.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", }, product_reference: "dtb-zte-5.3.18-150300.59.133.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2022-36402", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-36402", }, ], notes: [ { category: "general", text: "An integer overflow vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, references: [ { category: "external", summary: "CVE-2022-36402", url: "https://www.suse.com/security/cve/CVE-2022-36402", }, { category: "external", summary: "SUSE Bug 1203517 for CVE-2022-36402", url: "https://bugzilla.suse.com/1203517", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:12:25Z", details: "moderate", }, ], title: "CVE-2022-36402", }, { cve: "CVE-2023-2007", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2007", }, ], notes: [ { category: "general", text: "The specific flaw exists within the DPT I2O Controller driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, references: [ { category: "external", summary: "CVE-2023-2007", url: "https://www.suse.com/security/cve/CVE-2023-2007", }, { category: "external", summary: "SUSE Bug 1210448 for CVE-2023-2007", url: "https://bugzilla.suse.com/1210448", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:12:25Z", details: "moderate", }, ], title: "CVE-2023-2007", }, { cve: "CVE-2023-20588", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-20588", }, ], notes: [ { category: "general", text: "\nA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. \n\n\n\n\n\n\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, references: [ { category: "external", summary: "CVE-2023-20588", url: "https://www.suse.com/security/cve/CVE-2023-20588", }, { category: "external", summary: "SUSE Bug 1213927 for CVE-2023-20588", url: "https://bugzilla.suse.com/1213927", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], scores: [ { cvss_v3: { baseScore: 6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:12:25Z", details: "moderate", }, ], title: "CVE-2023-20588", }, { cve: "CVE-2023-21400", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-21400", }, ], notes: [ { category: "general", text: "In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, references: [ { category: "external", summary: "CVE-2023-21400", url: "https://www.suse.com/security/cve/CVE-2023-21400", }, { category: "external", summary: "SUSE Bug 1213272 for CVE-2023-21400", url: "https://bugzilla.suse.com/1213272", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:12:25Z", details: "moderate", }, ], title: "CVE-2023-21400", }, { cve: "CVE-2023-34319", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-34319", }, ], notes: [ { category: "general", text: "The fix for XSA-423 added logic to Linux'es netback driver to deal with\na frontend splitting a packet in a way such that not all of the headers\nwould come in one piece. Unfortunately the logic introduced there\ndidn't account for the extreme case of the entire packet being split\ninto as many pieces as permitted by the protocol, yet still being\nsmaller than the area that's specially dealt with to keep all (possible)\nheaders together. Such an unusual packet would therefore trigger a\nbuffer overrun in the driver.\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, references: [ { category: "external", summary: "CVE-2023-34319", url: "https://www.suse.com/security/cve/CVE-2023-34319", }, { category: "external", summary: "SUSE Bug 1213546 for CVE-2023-34319", url: "https://bugzilla.suse.com/1213546", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:12:25Z", details: "moderate", }, ], title: "CVE-2023-34319", }, { cve: "CVE-2023-3772", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3772", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, references: [ { category: "external", summary: "CVE-2023-3772", url: "https://www.suse.com/security/cve/CVE-2023-3772", }, { category: "external", summary: "SUSE Bug 1213666 for CVE-2023-3772", url: "https://bugzilla.suse.com/1213666", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:12:25Z", details: "moderate", }, ], title: "CVE-2023-3772", }, { cve: "CVE-2023-3863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3863", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC in the Linux kernel. This flaw allows a local user with special privileges to impact a kernel information leak issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, references: [ { category: "external", summary: "CVE-2023-3863", url: "https://www.suse.com/security/cve/CVE-2023-3863", }, { category: "external", summary: "SUSE Bug 1213601 for CVE-2023-3863", url: "https://bugzilla.suse.com/1213601", }, { category: "external", summary: "SUSE Bug 1213603 for CVE-2023-3863", url: "https://bugzilla.suse.com/1213603", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3863", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3863", url: "https://bugzilla.suse.com/1217531", }, { category: "external", summary: "SUSE Bug 1219704 for CVE-2023-3863", url: "https://bugzilla.suse.com/1219704", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:12:25Z", details: "moderate", }, ], title: "CVE-2023-3863", }, { cve: "CVE-2023-4128", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4128", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206, CVE-2023-4207, CVE-2023-4208 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, references: [ { category: "external", summary: "CVE-2023-4128", url: "https://www.suse.com/security/cve/CVE-2023-4128", }, { category: "external", summary: "SUSE Bug 1214149 for CVE-2023-4128", url: "https://bugzilla.suse.com/1214149", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:12:25Z", details: "moderate", }, ], title: "CVE-2023-4128", }, { cve: "CVE-2023-4132", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4132", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability was found in the siano smsusb module in the Linux kernel. The bug occurs during device initialization when the siano device is plugged in. This flaw allows a local user to crash the system, causing a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, references: [ { category: "external", summary: "CVE-2023-4132", url: "https://www.suse.com/security/cve/CVE-2023-4132", }, { category: "external", summary: "SUSE Bug 1213969 for CVE-2023-4132", url: "https://bugzilla.suse.com/1213969", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:12:25Z", details: "moderate", }, ], title: "CVE-2023-4132", }, { cve: "CVE-2023-4133", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4133", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability was found in the cxgb4 driver in the Linux kernel. The bug occurs when the cxgb4 device is detaching due to a possible rearming of the flower_stats_timer from the work queue. This flaw allows a local user to crash the system, causing a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, references: [ { category: "external", summary: "CVE-2023-4133", url: "https://www.suse.com/security/cve/CVE-2023-4133", }, { category: "external", summary: "SUSE Bug 1213970 for CVE-2023-4133", url: "https://bugzilla.suse.com/1213970", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:12:25Z", details: "moderate", }, ], title: "CVE-2023-4133", }, { cve: "CVE-2023-4134", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4134", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, references: [ { category: "external", summary: "CVE-2023-4134", url: "https://www.suse.com/security/cve/CVE-2023-4134", }, { category: "external", summary: "SUSE Bug 1213971 for CVE-2023-4134", url: "https://bugzilla.suse.com/1213971", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:12:25Z", details: "moderate", }, ], title: "CVE-2023-4134", }, { cve: "CVE-2023-4147", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4147", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in the Linux kernel's Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, references: [ { category: "external", summary: "CVE-2023-4147", url: "https://www.suse.com/security/cve/CVE-2023-4147", }, { category: "external", summary: "SUSE Bug 1213968 for CVE-2023-4147", url: "https://bugzilla.suse.com/1213968", }, { category: "external", summary: "SUSE Bug 1215118 for CVE-2023-4147", url: "https://bugzilla.suse.com/1215118", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:12:25Z", details: "important", }, ], title: "CVE-2023-4147", }, { cve: "CVE-2023-4194", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4194", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 (\"tun: tun_chr_open(): correctly initialize socket uid\"), - 66b2c338adce (\"tap: tap_open(): correctly initialize socket uid\"), pass \"inode->i_uid\" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, references: [ { category: "external", summary: "CVE-2023-4194", url: "https://www.suse.com/security/cve/CVE-2023-4194", }, { category: "external", summary: "SUSE Bug 1214019 for CVE-2023-4194", url: "https://bugzilla.suse.com/1214019", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:12:25Z", details: "moderate", }, ], title: "CVE-2023-4194", }, { cve: "CVE-2023-4273", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4273", }, ], notes: [ { category: "general", text: "A flaw was found in the exFAT driver of the Linux kernel. The vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this flaw to overflow the kernel stack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, references: [ { category: "external", summary: "CVE-2023-4273", url: "https://www.suse.com/security/cve/CVE-2023-4273", }, { category: "external", summary: "SUSE Bug 1214120 for CVE-2023-4273", url: "https://bugzilla.suse.com/1214120", }, { category: "external", summary: "SUSE Bug 1214123 for CVE-2023-4273", url: "https://bugzilla.suse.com/1214123", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:12:25Z", details: "important", }, ], title: "CVE-2023-4273", }, { cve: "CVE-2023-4385", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4385", }, ], notes: [ { category: "general", text: "A NULL pointer dereference flaw was found in dbFree in fs/jfs/jfs_dmap.c in the journaling file system (JFS) in the Linux Kernel. This issue may allow a local attacker to crash the system due to a missing sanity check.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, references: [ { category: "external", summary: "CVE-2023-4385", url: "https://www.suse.com/security/cve/CVE-2023-4385", }, { category: "external", summary: "SUSE Bug 1214348 for CVE-2023-4385", url: "https://bugzilla.suse.com/1214348", }, { category: "external", summary: "SUSE Bug 1222212 for CVE-2023-4385", url: "https://bugzilla.suse.com/1222212", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:12:25Z", details: "moderate", }, ], title: "CVE-2023-4385", }, { cve: "CVE-2023-4387", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4387", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in vmxnet3_rq_alloc_rx_buf in drivers/net/vmxnet3/vmxnet3_drv.c in VMware's vmxnet3 ethernet NIC driver in the Linux Kernel. This issue could allow a local attacker to crash the system due to a double-free while cleaning up vmxnet3_rq_cleanup_all, which could also lead to a kernel information leak problem.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, references: [ { category: "external", summary: "CVE-2023-4387", url: "https://www.suse.com/security/cve/CVE-2023-4387", }, { category: "external", summary: "SUSE Bug 1214350 for CVE-2023-4387", url: "https://bugzilla.suse.com/1214350", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:12:25Z", details: "moderate", }, ], title: "CVE-2023-4387", }, { cve: "CVE-2023-4459", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4459", }, ], notes: [ { category: "general", text: "A NULL pointer dereference flaw was found in vmxnet3_rq_cleanup in drivers/net/vmxnet3/vmxnet3_drv.c in the networking sub-component in vmxnet3 in the Linux Kernel. This issue may allow a local attacker with normal user privilege to cause a denial of service due to a missing sanity check during cleanup.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, references: [ { category: "external", summary: "CVE-2023-4459", url: "https://www.suse.com/security/cve/CVE-2023-4459", }, { category: "external", summary: "SUSE Bug 1214451 for CVE-2023-4459", url: "https://bugzilla.suse.com/1214451", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_133-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.133.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.133.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.133.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.133.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.133.1.aarch64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:12:25Z", details: "moderate", }, ], title: "CVE-2023-4459", }, ], }
suse-su-2023:3687-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-2007: Fixed a flaw in the DPT I2O Controller driver that could allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel (bsc#1210448).\n- CVE-2023-3772: Fixed a flaw in XFRM subsystem that may have allowed a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer leading to a possible kernel crash and denial of service (bsc#1213666).\n- CVE-2023-3863: Fixed a use-after-free flaw was found in nfc_llcp_find_local that allowed a local user with special privileges to impact a kernel information leak issue (bsc#1213601).\n- CVE-2023-4128: Fixed a use-after-free flaw in net/sched/cls_fw.c that allowed a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue (bsc#1214149).\n- CVE-2023-4132: Fixed use-after-free vulnerability was found in the siano smsusb module that allowed a local user to crash the system, causing a denial of service condition (bsc#1213969).\n- CVE-2023-4134: Fixed use-after-free in cyttsp4_watchdog_work() (bsc#1213971).\n- CVE-2023-4273: Fixed a flaw in the exFAT driver of the Linux kernel that alloawed a local privileged attacker to overflow the kernel stack (bsc#1214120).\n- CVE-2023-4385: Fixed a NULL pointer dereference flaw in dbFree that may have allowed a local attacker to crash the system due to a missing sanity check (bsc#1214348).\n- CVE-2023-4387: Fixed use-after-free flaw in vmxnet3_rq_alloc_rx_buf that could allow a local attacker to crash the system due to a double-free (bsc#1214350).\n- CVE-2023-4459: Fixed a NULL pointer dereference flaw in vmxnet3_rq_cleanup that may have allowed a local attacker with normal user privilege to cause a denial of service (bsc#1214451).\n- CVE-2022-36402: Fixed an integer overflow vulnerability in vmwgfx driver in that allowed a local attacker with a user account on the system to gain privilege, causing a denial of service (bsc#1203517).\n- CVE-2023-20588: Fixed a division-by-zero error on some AMD processors that can potentially return speculative data resulting in loss of confidentiality (bsc#1213927).\n- CVE-2023-21400: Fixed several memory corruptions due to improper locking in io_uring (bsc#1213272).\n\n\nThe following non-security bugs were fixed:\n\n- kabi/severities: Ignore newly added SRSO mitigation functions\n- x86/cpu/kvm: Provide UNTRAIN_RET_VM (git-fixes).\n- x86/cpu: Cleanup the untrain mess (git-fixes).\n- x86/cpu: Rename original retbleed methods (git-fixes).\n- x86/cpu: Rename srso_(.*)_alias to srso_alias_\\1 (git-fixes).\n- x86/retpoline: Do not clobber RFLAGS during srso_safe_ret() (git-fixes).\n- x86/speculation: Add cpu_show_gds() prototype (git-fixes).\n- x86/speculation: Mark all Skylake CPUs as vulnerable to GDS (git-fixes).\n- x86/srso: Correct the mitigation status when SMT is disabled (git-fixes).\n- x86/srso: Disable the mitigation on unaffected configurations (git-fixes).\n- x86/srso: Explain the untraining sequences a bit more (git-fixes).\n- x86: Move gds_ucode_mitigated() declaration to header (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-3687,SUSE-SLE-Module-Live-Patching-15-SP2-2023-3687,SUSE-SLE-Product-HA-15-SP2-2023-3687,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3687,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3687,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3687", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3687-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:3687-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20233687-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:3687-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html", }, { category: "self", summary: "SUSE Bug 1203517", url: "https://bugzilla.suse.com/1203517", }, { category: "self", summary: "SUSE Bug 1210448", url: "https://bugzilla.suse.com/1210448", }, { category: "self", summary: "SUSE Bug 1213272", url: "https://bugzilla.suse.com/1213272", }, { category: "self", summary: "SUSE Bug 1213601", url: "https://bugzilla.suse.com/1213601", }, { category: "self", summary: "SUSE Bug 1213666", url: "https://bugzilla.suse.com/1213666", }, { category: "self", summary: "SUSE Bug 1213927", url: "https://bugzilla.suse.com/1213927", }, { category: "self", summary: "SUSE Bug 1213969", url: "https://bugzilla.suse.com/1213969", }, { category: "self", summary: "SUSE Bug 1213971", url: "https://bugzilla.suse.com/1213971", }, { category: "self", summary: "SUSE Bug 1214120", url: "https://bugzilla.suse.com/1214120", }, { category: "self", summary: "SUSE Bug 1214149", url: "https://bugzilla.suse.com/1214149", }, { category: "self", summary: "SUSE Bug 1214348", url: "https://bugzilla.suse.com/1214348", }, { category: "self", summary: "SUSE Bug 1214350", url: "https://bugzilla.suse.com/1214350", }, { category: "self", summary: "SUSE Bug 1214451", url: "https://bugzilla.suse.com/1214451", }, { category: "self", summary: "SUSE CVE CVE-2022-36402 page", url: "https://www.suse.com/security/cve/CVE-2022-36402/", }, { category: "self", summary: "SUSE CVE CVE-2023-2007 page", url: "https://www.suse.com/security/cve/CVE-2023-2007/", }, { category: "self", summary: "SUSE CVE CVE-2023-20588 page", url: "https://www.suse.com/security/cve/CVE-2023-20588/", }, { category: "self", summary: "SUSE CVE CVE-2023-21400 page", url: "https://www.suse.com/security/cve/CVE-2023-21400/", }, { category: "self", summary: "SUSE CVE CVE-2023-3772 page", url: "https://www.suse.com/security/cve/CVE-2023-3772/", }, { category: "self", summary: "SUSE CVE CVE-2023-3863 page", url: "https://www.suse.com/security/cve/CVE-2023-3863/", }, { category: "self", summary: "SUSE CVE CVE-2023-4128 page", url: "https://www.suse.com/security/cve/CVE-2023-4128/", }, { category: "self", summary: "SUSE CVE CVE-2023-4132 page", url: "https://www.suse.com/security/cve/CVE-2023-4132/", }, { category: "self", summary: "SUSE CVE CVE-2023-4134 page", url: "https://www.suse.com/security/cve/CVE-2023-4134/", }, { category: "self", summary: "SUSE CVE CVE-2023-4273 page", url: "https://www.suse.com/security/cve/CVE-2023-4273/", }, { category: "self", summary: "SUSE CVE CVE-2023-4385 page", url: "https://www.suse.com/security/cve/CVE-2023-4385/", }, { category: "self", summary: "SUSE CVE CVE-2023-4387 page", url: "https://www.suse.com/security/cve/CVE-2023-4387/", }, { category: "self", summary: "SUSE CVE CVE-2023-4459 page", url: "https://www.suse.com/security/cve/CVE-2023-4459/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-09-19T15:40:00Z", generator: { date: "2023-09-19T15:40:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:3687-1", initial_release_date: "2023-09-19T15:40:00Z", revision_history: [ { date: "2023-09-19T15:40:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", product: { name: "cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", product_id: "cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-150200.24.163.1.aarch64", product: { name: "cluster-md-kmp-preempt-5.3.18-150200.24.163.1.aarch64", product_id: "cluster-md-kmp-preempt-5.3.18-150200.24.163.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", product: { name: "dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", product_id: "dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-150200.24.163.1.aarch64", product: { name: "dlm-kmp-preempt-5.3.18-150200.24.163.1.aarch64", product_id: "dlm-kmp-preempt-5.3.18-150200.24.163.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", product: { name: "gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", product_id: "gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-150200.24.163.1.aarch64", product: { name: "gfs2-kmp-preempt-5.3.18-150200.24.163.1.aarch64", product_id: "gfs2-kmp-preempt-5.3.18-150200.24.163.1.aarch64", }, }, { category: "product_version", name: "kernel-default-5.3.18-150200.24.163.1.aarch64", product: { name: "kernel-default-5.3.18-150200.24.163.1.aarch64", product_id: "kernel-default-5.3.18-150200.24.163.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", product: { name: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", product_id: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", product: { name: "kernel-default-base-rebuild-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", product_id: "kernel-default-base-rebuild-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150200.24.163.1.aarch64", product: { name: "kernel-default-devel-5.3.18-150200.24.163.1.aarch64", product_id: "kernel-default-devel-5.3.18-150200.24.163.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150200.24.163.1.aarch64", product: { name: "kernel-default-extra-5.3.18-150200.24.163.1.aarch64", product_id: "kernel-default-extra-5.3.18-150200.24.163.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150200.24.163.1.aarch64", product: { name: "kernel-default-livepatch-5.3.18-150200.24.163.1.aarch64", product_id: "kernel-default-livepatch-5.3.18-150200.24.163.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150200.24.163.1.aarch64", product: { name: "kernel-default-livepatch-devel-5.3.18-150200.24.163.1.aarch64", product_id: "kernel-default-livepatch-devel-5.3.18-150200.24.163.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150200.24.163.1.aarch64", product: { name: "kernel-obs-build-5.3.18-150200.24.163.1.aarch64", product_id: "kernel-obs-build-5.3.18-150200.24.163.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150200.24.163.1.aarch64", product: { name: "kernel-obs-qa-5.3.18-150200.24.163.1.aarch64", product_id: "kernel-obs-qa-5.3.18-150200.24.163.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-150200.24.163.1.aarch64", product: { name: "kernel-preempt-5.3.18-150200.24.163.1.aarch64", product_id: "kernel-preempt-5.3.18-150200.24.163.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", product: { name: "kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", product_id: "kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-150200.24.163.1.aarch64", product: { name: "kernel-preempt-extra-5.3.18-150200.24.163.1.aarch64", product_id: "kernel-preempt-extra-5.3.18-150200.24.163.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-150200.24.163.1.aarch64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-150200.24.163.1.aarch64", product_id: "kernel-preempt-livepatch-devel-5.3.18-150200.24.163.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150200.24.163.1.aarch64", product: { name: "kernel-syms-5.3.18-150200.24.163.1.aarch64", product_id: "kernel-syms-5.3.18-150200.24.163.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150200.24.163.1.aarch64", product: { name: "kselftests-kmp-default-5.3.18-150200.24.163.1.aarch64", product_id: "kselftests-kmp-default-5.3.18-150200.24.163.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-150200.24.163.1.aarch64", product: { name: "kselftests-kmp-preempt-5.3.18-150200.24.163.1.aarch64", product_id: "kselftests-kmp-preempt-5.3.18-150200.24.163.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", product: { name: "ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", product_id: "ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-150200.24.163.1.aarch64", product: { name: "ocfs2-kmp-preempt-5.3.18-150200.24.163.1.aarch64", product_id: "ocfs2-kmp-preempt-5.3.18-150200.24.163.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", product: { name: "reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", product_id: "reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-150200.24.163.1.aarch64", product: { name: "reiserfs-kmp-preempt-5.3.18-150200.24.163.1.aarch64", product_id: "reiserfs-kmp-preempt-5.3.18-150200.24.163.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-5.3.18-150200.24.163.1.noarch", product: { name: "kernel-devel-5.3.18-150200.24.163.1.noarch", product_id: "kernel-devel-5.3.18-150200.24.163.1.noarch", }, }, { category: "product_version", name: "kernel-docs-5.3.18-150200.24.163.1.noarch", product: { name: "kernel-docs-5.3.18-150200.24.163.1.noarch", product_id: "kernel-docs-5.3.18-150200.24.163.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-5.3.18-150200.24.163.1.noarch", product: { name: "kernel-docs-html-5.3.18-150200.24.163.1.noarch", product_id: "kernel-docs-html-5.3.18-150200.24.163.1.noarch", }, }, { category: "product_version", name: "kernel-macros-5.3.18-150200.24.163.1.noarch", product: { name: "kernel-macros-5.3.18-150200.24.163.1.noarch", product_id: "kernel-macros-5.3.18-150200.24.163.1.noarch", }, }, { category: "product_version", name: "kernel-source-5.3.18-150200.24.163.1.noarch", product: { name: "kernel-source-5.3.18-150200.24.163.1.noarch", product_id: "kernel-source-5.3.18-150200.24.163.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-5.3.18-150200.24.163.1.noarch", product: { name: "kernel-source-vanilla-5.3.18-150200.24.163.1.noarch", product_id: "kernel-source-vanilla-5.3.18-150200.24.163.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", product: { name: "cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", product_id: "cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", product: { name: "dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", product_id: "dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", product: { name: "gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", product_id: "gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-5.3.18-150200.24.163.1.ppc64le", product: { name: "kernel-debug-5.3.18-150200.24.163.1.ppc64le", product_id: "kernel-debug-5.3.18-150200.24.163.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-150200.24.163.1.ppc64le", product: { name: "kernel-debug-devel-5.3.18-150200.24.163.1.ppc64le", product_id: "kernel-debug-devel-5.3.18-150200.24.163.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", product: { name: "kernel-debug-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", product_id: "kernel-debug-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-5.3.18-150200.24.163.1.ppc64le", product: { name: "kernel-default-5.3.18-150200.24.163.1.ppc64le", product_id: "kernel-default-5.3.18-150200.24.163.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", product: { name: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", product_id: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", product: { name: "kernel-default-base-rebuild-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", product_id: "kernel-default-base-rebuild-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", product: { name: "kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", product_id: "kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150200.24.163.1.ppc64le", product: { name: "kernel-default-extra-5.3.18-150200.24.163.1.ppc64le", product_id: "kernel-default-extra-5.3.18-150200.24.163.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", product: { name: "kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", product_id: "kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", product: { name: "kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", product_id: "kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-150200.24.163.1.ppc64le", product: { name: "kernel-kvmsmall-5.3.18-150200.24.163.1.ppc64le", product_id: "kernel-kvmsmall-5.3.18-150200.24.163.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-150200.24.163.1.ppc64le", product: { name: "kernel-kvmsmall-devel-5.3.18-150200.24.163.1.ppc64le", product_id: "kernel-kvmsmall-devel-5.3.18-150200.24.163.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", product: { name: "kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", product_id: "kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", product: { name: "kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", product_id: "kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150200.24.163.1.ppc64le", product: { name: "kernel-obs-qa-5.3.18-150200.24.163.1.ppc64le", product_id: "kernel-obs-qa-5.3.18-150200.24.163.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150200.24.163.1.ppc64le", product: { name: "kernel-syms-5.3.18-150200.24.163.1.ppc64le", product_id: "kernel-syms-5.3.18-150200.24.163.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150200.24.163.1.ppc64le", product: { name: "kselftests-kmp-default-5.3.18-150200.24.163.1.ppc64le", product_id: "kselftests-kmp-default-5.3.18-150200.24.163.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", product: { name: "ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", product_id: "ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", product: { name: "reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", product_id: "reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", product: { name: "cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", product_id: "cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150200.24.163.1.s390x", product: { name: "dlm-kmp-default-5.3.18-150200.24.163.1.s390x", product_id: "dlm-kmp-default-5.3.18-150200.24.163.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", product: { name: "gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", product_id: "gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", }, }, { category: "product_version", name: "kernel-default-5.3.18-150200.24.163.1.s390x", product: { name: "kernel-default-5.3.18-150200.24.163.1.s390x", product_id: "kernel-default-5.3.18-150200.24.163.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", product: { name: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", product_id: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150200.24.163.1.150200.9.81.1.s390x", product: { name: "kernel-default-base-rebuild-5.3.18-150200.24.163.1.150200.9.81.1.s390x", product_id: "kernel-default-base-rebuild-5.3.18-150200.24.163.1.150200.9.81.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150200.24.163.1.s390x", product: { name: "kernel-default-devel-5.3.18-150200.24.163.1.s390x", product_id: "kernel-default-devel-5.3.18-150200.24.163.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150200.24.163.1.s390x", product: { name: "kernel-default-extra-5.3.18-150200.24.163.1.s390x", product_id: "kernel-default-extra-5.3.18-150200.24.163.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", product: { name: "kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", product_id: "kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", product: { name: "kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", product_id: "kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", product: { name: "kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", product_id: "kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150200.24.163.1.s390x", product: { name: "kernel-obs-build-5.3.18-150200.24.163.1.s390x", product_id: "kernel-obs-build-5.3.18-150200.24.163.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150200.24.163.1.s390x", product: { name: "kernel-obs-qa-5.3.18-150200.24.163.1.s390x", product_id: "kernel-obs-qa-5.3.18-150200.24.163.1.s390x", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150200.24.163.1.s390x", product: { name: "kernel-syms-5.3.18-150200.24.163.1.s390x", product_id: "kernel-syms-5.3.18-150200.24.163.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-5.3.18-150200.24.163.1.s390x", product: { name: "kernel-zfcpdump-5.3.18-150200.24.163.1.s390x", product_id: "kernel-zfcpdump-5.3.18-150200.24.163.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150200.24.163.1.s390x", product: { name: "kselftests-kmp-default-5.3.18-150200.24.163.1.s390x", product_id: "kselftests-kmp-default-5.3.18-150200.24.163.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", product: { name: "ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", product_id: "ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", product: { name: "reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", product_id: "reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", product: { name: "cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", product_id: "cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-150200.24.163.1.x86_64", product: { name: "cluster-md-kmp-preempt-5.3.18-150200.24.163.1.x86_64", product_id: "cluster-md-kmp-preempt-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", product: { name: "dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", product_id: "dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-150200.24.163.1.x86_64", product: { name: "dlm-kmp-preempt-5.3.18-150200.24.163.1.x86_64", product_id: "dlm-kmp-preempt-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", product: { name: "gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", product_id: "gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-150200.24.163.1.x86_64", product: { name: "gfs2-kmp-preempt-5.3.18-150200.24.163.1.x86_64", product_id: "gfs2-kmp-preempt-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-5.3.18-150200.24.163.1.x86_64", product: { name: "kernel-debug-5.3.18-150200.24.163.1.x86_64", product_id: "kernel-debug-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-150200.24.163.1.x86_64", product: { name: "kernel-debug-devel-5.3.18-150200.24.163.1.x86_64", product_id: "kernel-debug-devel-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-150200.24.163.1.x86_64", product: { name: "kernel-debug-livepatch-devel-5.3.18-150200.24.163.1.x86_64", product_id: "kernel-debug-livepatch-devel-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "kernel-default-5.3.18-150200.24.163.1.x86_64", product: { name: "kernel-default-5.3.18-150200.24.163.1.x86_64", product_id: "kernel-default-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", product: { name: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", product_id: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", product: { name: "kernel-default-base-rebuild-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", product_id: "kernel-default-base-rebuild-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-150200.24.163.1.x86_64", product: { name: "kernel-default-devel-5.3.18-150200.24.163.1.x86_64", product_id: "kernel-default-devel-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-150200.24.163.1.x86_64", product: { name: "kernel-default-extra-5.3.18-150200.24.163.1.x86_64", product_id: "kernel-default-extra-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", product: { name: "kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", product_id: "kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", product: { name: "kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", product_id: "kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-150200.24.163.1.x86_64", product: { name: "kernel-kvmsmall-5.3.18-150200.24.163.1.x86_64", product_id: "kernel-kvmsmall-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-150200.24.163.1.x86_64", product: { name: "kernel-kvmsmall-devel-5.3.18-150200.24.163.1.x86_64", product_id: "kernel-kvmsmall-devel-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.163.1.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.163.1.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", product: { name: "kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", product_id: "kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150200_24_163-preempt-1-150200.5.3.1.x86_64", product: { name: "kernel-livepatch-5_3_18-150200_24_163-preempt-1-150200.5.3.1.x86_64", product_id: "kernel-livepatch-5_3_18-150200_24_163-preempt-1-150200.5.3.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-150200.24.163.1.x86_64", product: { name: "kernel-obs-build-5.3.18-150200.24.163.1.x86_64", product_id: "kernel-obs-build-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-150200.24.163.1.x86_64", product: { name: "kernel-obs-qa-5.3.18-150200.24.163.1.x86_64", product_id: "kernel-obs-qa-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-150200.24.163.1.x86_64", product: { name: "kernel-preempt-5.3.18-150200.24.163.1.x86_64", product_id: "kernel-preempt-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", product: { name: "kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", product_id: "kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-150200.24.163.1.x86_64", product: { name: "kernel-preempt-extra-5.3.18-150200.24.163.1.x86_64", product_id: "kernel-preempt-extra-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-150200.24.163.1.x86_64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-150200.24.163.1.x86_64", product_id: "kernel-preempt-livepatch-devel-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-150200.24.163.1.x86_64", product: { name: "kernel-syms-5.3.18-150200.24.163.1.x86_64", product_id: "kernel-syms-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-150200.24.163.1.x86_64", product: { name: "kselftests-kmp-default-5.3.18-150200.24.163.1.x86_64", product_id: "kselftests-kmp-default-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-150200.24.163.1.x86_64", product: { name: "kselftests-kmp-preempt-5.3.18-150200.24.163.1.x86_64", product_id: "kselftests-kmp-preempt-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", product: { name: "ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", product_id: "ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-150200.24.163.1.x86_64", product: { name: "ocfs2-kmp-preempt-5.3.18-150200.24.163.1.x86_64", product_id: "ocfs2-kmp-preempt-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", product: { name: "reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", product_id: "reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-150200.24.163.1.x86_64", product: { name: "reiserfs-kmp-preempt-5.3.18-150200.24.163.1.x86_64", product_id: "reiserfs-kmp-preempt-5.3.18-150200.24.163.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP2", product: { name: "SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15 SP2", product: { name: "SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", }, product_reference: "kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150200.24.163.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", }, product_reference: "kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", }, product_reference: "kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", }, product_reference: "kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", }, product_reference: "kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", }, product_reference: "kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", }, product_reference: "cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", }, product_reference: "cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", }, product_reference: "cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", }, product_reference: "cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150200.24.163.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", }, product_reference: "dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", }, product_reference: "dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150200.24.163.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", }, product_reference: "dlm-kmp-default-5.3.18-150200.24.163.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", }, product_reference: "dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", }, product_reference: "gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", }, product_reference: "gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150200.24.163.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", }, product_reference: "gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", }, product_reference: "gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", }, product_reference: "ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", }, product_reference: "ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", }, product_reference: "ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", }, product_reference: "ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.163.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", }, product_reference: "kernel-default-5.3.18-150200.24.163.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", }, product_reference: "kernel-default-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.163.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-150200.24.163.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150200.24.163.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", }, product_reference: "kernel-devel-5.3.18-150200.24.163.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150200.24.163.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", }, product_reference: "kernel-docs-5.3.18-150200.24.163.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150200.24.163.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", }, product_reference: "kernel-macros-5.3.18-150200.24.163.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.163.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-150200.24.163.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150200.24.163.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-150200.24.163.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150200.24.163.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", }, product_reference: "kernel-source-5.3.18-150200.24.163.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.163.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", }, product_reference: "kernel-syms-5.3.18-150200.24.163.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.163.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", }, product_reference: "kernel-default-5.3.18-150200.24.163.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.163.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", }, product_reference: "kernel-default-5.3.18-150200.24.163.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.163.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", }, product_reference: "kernel-default-5.3.18-150200.24.163.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", }, product_reference: "kernel-default-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", }, product_reference: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", }, product_reference: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.163.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-150200.24.163.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.163.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", }, product_reference: "kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.163.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", }, product_reference: "kernel-default-devel-5.3.18-150200.24.163.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150200.24.163.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", }, product_reference: "kernel-devel-5.3.18-150200.24.163.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150200.24.163.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", }, product_reference: "kernel-docs-5.3.18-150200.24.163.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150200.24.163.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", }, product_reference: "kernel-macros-5.3.18-150200.24.163.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.163.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-150200.24.163.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.163.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", }, product_reference: "kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.163.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", }, product_reference: "kernel-obs-build-5.3.18-150200.24.163.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150200.24.163.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-150200.24.163.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150200.24.163.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", }, product_reference: "kernel-source-5.3.18-150200.24.163.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.163.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", }, product_reference: "kernel-syms-5.3.18-150200.24.163.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.163.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", }, product_reference: "kernel-syms-5.3.18-150200.24.163.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.163.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", }, product_reference: "kernel-syms-5.3.18-150200.24.163.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", }, product_reference: "reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.163.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", }, product_reference: "kernel-default-5.3.18-150200.24.163.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", }, product_reference: "kernel-default-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", }, product_reference: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.163.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", }, product_reference: "kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-150200.24.163.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", }, product_reference: "kernel-devel-5.3.18-150200.24.163.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-150200.24.163.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", }, product_reference: "kernel-docs-5.3.18-150200.24.163.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-150200.24.163.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", }, product_reference: "kernel-macros-5.3.18-150200.24.163.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.163.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", }, product_reference: "kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-150200.24.163.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", }, product_reference: "kernel-source-5.3.18-150200.24.163.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.163.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", }, product_reference: "kernel-syms-5.3.18-150200.24.163.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", }, product_reference: "kernel-syms-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, ], }, vulnerabilities: [ { cve: "CVE-2022-36402", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-36402", }, ], notes: [ { category: "general", text: "An integer overflow vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-36402", url: "https://www.suse.com/security/cve/CVE-2022-36402", }, { category: "external", summary: "SUSE Bug 1203517 for CVE-2022-36402", url: "https://bugzilla.suse.com/1203517", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:40:00Z", details: "moderate", }, ], title: "CVE-2022-36402", }, { cve: "CVE-2023-2007", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2007", }, ], notes: [ { category: "general", text: "The specific flaw exists within the DPT I2O Controller driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2007", url: "https://www.suse.com/security/cve/CVE-2023-2007", }, { category: "external", summary: "SUSE Bug 1210448 for CVE-2023-2007", url: "https://bugzilla.suse.com/1210448", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:40:00Z", details: "moderate", }, ], title: "CVE-2023-2007", }, { cve: "CVE-2023-20588", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-20588", }, ], notes: [ { category: "general", text: "\nA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. \n\n\n\n\n\n\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-20588", url: "https://www.suse.com/security/cve/CVE-2023-20588", }, { category: "external", summary: "SUSE Bug 1213927 for CVE-2023-20588", url: "https://bugzilla.suse.com/1213927", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:40:00Z", details: "moderate", }, ], title: "CVE-2023-20588", }, { cve: "CVE-2023-21400", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-21400", }, ], notes: [ { category: "general", text: "In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-21400", url: "https://www.suse.com/security/cve/CVE-2023-21400", }, { category: "external", summary: "SUSE Bug 1213272 for CVE-2023-21400", url: "https://bugzilla.suse.com/1213272", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:40:00Z", details: "moderate", }, ], title: "CVE-2023-21400", }, { cve: "CVE-2023-3772", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3772", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3772", url: "https://www.suse.com/security/cve/CVE-2023-3772", }, { category: "external", summary: "SUSE Bug 1213666 for CVE-2023-3772", url: "https://bugzilla.suse.com/1213666", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:40:00Z", details: "moderate", }, ], title: "CVE-2023-3772", }, { cve: "CVE-2023-3863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3863", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC in the Linux kernel. This flaw allows a local user with special privileges to impact a kernel information leak issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3863", url: "https://www.suse.com/security/cve/CVE-2023-3863", }, { category: "external", summary: "SUSE Bug 1213601 for CVE-2023-3863", url: "https://bugzilla.suse.com/1213601", }, { category: "external", summary: "SUSE Bug 1213603 for CVE-2023-3863", url: "https://bugzilla.suse.com/1213603", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3863", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3863", url: "https://bugzilla.suse.com/1217531", }, { category: "external", summary: "SUSE Bug 1219704 for CVE-2023-3863", url: "https://bugzilla.suse.com/1219704", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:40:00Z", details: "moderate", }, ], title: "CVE-2023-3863", }, { cve: "CVE-2023-4128", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4128", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206, CVE-2023-4207, CVE-2023-4208 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4128", url: "https://www.suse.com/security/cve/CVE-2023-4128", }, { category: "external", summary: "SUSE Bug 1214149 for CVE-2023-4128", url: "https://bugzilla.suse.com/1214149", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:40:00Z", details: "moderate", }, ], title: "CVE-2023-4128", }, { cve: "CVE-2023-4132", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4132", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability was found in the siano smsusb module in the Linux kernel. The bug occurs during device initialization when the siano device is plugged in. This flaw allows a local user to crash the system, causing a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4132", url: "https://www.suse.com/security/cve/CVE-2023-4132", }, { category: "external", summary: "SUSE Bug 1213969 for CVE-2023-4132", url: "https://bugzilla.suse.com/1213969", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:40:00Z", details: "moderate", }, ], title: "CVE-2023-4132", }, { cve: "CVE-2023-4134", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4134", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4134", url: "https://www.suse.com/security/cve/CVE-2023-4134", }, { category: "external", summary: "SUSE Bug 1213971 for CVE-2023-4134", url: "https://bugzilla.suse.com/1213971", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:40:00Z", details: "moderate", }, ], title: "CVE-2023-4134", }, { cve: "CVE-2023-4273", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4273", }, ], notes: [ { category: "general", text: "A flaw was found in the exFAT driver of the Linux kernel. The vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this flaw to overflow the kernel stack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4273", url: "https://www.suse.com/security/cve/CVE-2023-4273", }, { category: "external", summary: "SUSE Bug 1214120 for CVE-2023-4273", url: "https://bugzilla.suse.com/1214120", }, { category: "external", summary: "SUSE Bug 1214123 for CVE-2023-4273", url: "https://bugzilla.suse.com/1214123", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:40:00Z", details: "important", }, ], title: "CVE-2023-4273", }, { cve: "CVE-2023-4385", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4385", }, ], notes: [ { category: "general", text: "A NULL pointer dereference flaw was found in dbFree in fs/jfs/jfs_dmap.c in the journaling file system (JFS) in the Linux Kernel. This issue may allow a local attacker to crash the system due to a missing sanity check.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4385", url: "https://www.suse.com/security/cve/CVE-2023-4385", }, { category: "external", summary: "SUSE Bug 1214348 for CVE-2023-4385", url: "https://bugzilla.suse.com/1214348", }, { category: "external", summary: "SUSE Bug 1222212 for CVE-2023-4385", url: "https://bugzilla.suse.com/1222212", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:40:00Z", details: "moderate", }, ], title: "CVE-2023-4385", }, { cve: "CVE-2023-4387", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4387", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in vmxnet3_rq_alloc_rx_buf in drivers/net/vmxnet3/vmxnet3_drv.c in VMware's vmxnet3 ethernet NIC driver in the Linux Kernel. This issue could allow a local attacker to crash the system due to a double-free while cleaning up vmxnet3_rq_cleanup_all, which could also lead to a kernel information leak problem.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4387", url: "https://www.suse.com/security/cve/CVE-2023-4387", }, { category: "external", summary: "SUSE Bug 1214350 for CVE-2023-4387", url: "https://bugzilla.suse.com/1214350", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:40:00Z", details: "moderate", }, ], title: "CVE-2023-4387", }, { cve: "CVE-2023-4459", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4459", }, ], notes: [ { category: "general", text: "A NULL pointer dereference flaw was found in vmxnet3_rq_cleanup in drivers/net/vmxnet3/vmxnet3_drv.c in the networking sub-component in vmxnet3 in the Linux Kernel. This issue may allow a local attacker with normal user privilege to cause a denial of service due to a missing sanity check during cleanup.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4459", url: "https://www.suse.com/security/cve/CVE-2023-4459", }, { category: "external", summary: "SUSE Bug 1214451 for CVE-2023-4459", url: "https://bugzilla.suse.com/1214451", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_163-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.163.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.163.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.163.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-19T15:40:00Z", details: "moderate", }, ], title: "CVE-2023-4459", }, ], }
suse-su-2023:3785-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2022-36402: Fixed an integer overflow vulnerability in vmwgfx driver in that allowed a local attacker with a user account on the system to gain privilege, causing a denial of service (bsc#1203517).\n- CVE-2023-2007: Fixed a flaw in the DPT I2O Controller driver that could allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel (bsc#1210448).\n- CVE-2023-3772: Fixed a flaw in XFRM subsystem that may have allowed a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer leading to a possible kernel crash and denial of service (bsc#1213666).\n- CVE-2023-3863: Fixed a use-after-free flaw was found in nfc_llcp_find_local that allowed a local user with special privileges to impact a kernel information leak issue (bsc#1213601).\n- CVE-2023-4128: Fixed a use-after-free flaw in net/sched/cls_fw.c that allowed a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue (bsc#1214149).\n- CVE-2023-4132: Fixed use-after-free vulnerability was found in the siano smsusb module that allowed a local user to crash the system, causing a denial of service condition (bsc#1213969).\n- CVE-2023-4133: Fixed use after free bugs caused by circular dependency problem in cxgb4 (bsc#1213970).\n- CVE-2023-4134: Fixed use-after-free in cyttsp4_watchdog_work() (bsc#1213971).\n- CVE-2023-4147: Fixed use-after-free in nf_tables_newrule (bsc#1213968).\n- CVE-2023-4194: Fixed a type confusion in net tun_chr_open() (bsc#1214019).\n- CVE-2023-4273: Fixed a flaw in the exFAT driver of the Linux kernel that alloawed a local privileged attacker to overflow the kernel stack (bsc#1214120).\n- CVE-2023-4385: Fixed a NULL pointer dereference flaw in dbFree that may have allowed a local attacker to crash the system due to a missing sanity check (bsc#1214348).\n- CVE-2023-4387: Fixed use-after-free flaw in vmxnet3_rq_alloc_rx_buf that could allow a local attacker to crash the system due to a double-free (bsc#1214350).\n- CVE-2023-4459: Fixed a NULL pointer dereference flaw in vmxnet3_rq_cleanup that may have allowed a local attacker with normal user privilege to cause a denial of service (bsc#1214451).\n- CVE-2023-20588: Fixed a division-by-zero error on some AMD processors that can potentially return speculative data resulting in loss of confidentiality (bsc#1213927).\n- CVE-2023-21400: Fixed several memory corruptions due to improper locking in io_uring (bsc#1213272).\n- CVE-2023-34319: Fixed buffer overrun triggered by unusual packet in xen/netback (XSA-432) (bsc#1213546).\n\nThe following non-security bugs were fixed:\n\n- ARM: spear: Do not use timer namespace for timer_shutdown() function (bsc#1213970).\n- Do not add and remove genksyms ifdefs\n- clocksource/drivers/arm_arch_timer: Do not use timer namespace for timer_shutdown() function (bsc#1213970).\n- clocksource/drivers/sp804: Do not use timer namespace for timer_shutdown() function (bsc#1213970).\n- e1000: Fix fall-through warnings for Clang (jsc#PED-5738).\n- e1000: Fix typos in comments (jsc#PED-5738).\n- e1000: Remove unnecessary use of kmap_atomic() (jsc#PED-5738).\n- e1000: drop unneeded assignment in e1000_set_itr() (jsc#PED-5738).\n- e1000: switch to napi_consume_skb() (jsc#PED-5738).\n- intel/e1000:fix repeated words in comments (jsc#PED-5738).\n- intel: remove checker warning (jsc#PED-5738).\n- kabi/severities: Ignore newly added SRSO mitigation functions\n- md/raid0: Factor out helper for mapping and submitting a bio (bsc#1213916).\n- md/raid0: Fix performance regression for large sequential writes (bsc#1213916).\n- net: e1000: remove repeated word 'slot' for e1000_main.c (jsc#PED-5738).\n- net: e1000: remove repeated words for e1000_hw.c (jsc#PED-5738).\n- powerpc/rtas: block error injection when locked down (bsc#1023051).\n- powerpc/rtas: mandate RTAS syscall filtering (bsc#1023051).\n- powerpc/rtas: move syscall filter setup into separate function (bsc#1023051).\n- powerpc/rtas: remove ibm_suspend_me_token (bsc#1023051).\n- powerpc: Move DMA64_PROPNAME define to a header (bsc#1214297 ltc#197503).\n- pseries/iommu/ddw: Fix kdump to work in absence of ibm,dma-window (bsc#1214297 ltc#197503).\n- timers: Add shutdown mechanism to the internal functions (bsc#1213970).\n- timers: Provide timer_shutdown[_sync]() (bsc#1213970).\n- timers: Rename del_timer() to timer_delete() (bsc#1213970).\n- timers: Rename del_timer_sync() to timer_delete_sync() (bsc#1213970).\n- timers: Replace BUG_ON()s (bsc#1213970).\n- timers: Silently ignore timers with a NULL function (bsc#1213970).\n- timers: Split [try_to_]del_timer[_sync]() to prepare for shutdown mode (bsc#1213970).\n- timers: Update kernel-doc for various functions (bsc#1213970).\n- timers: Use del_timer_sync() even on UP (bsc#1213970).\n- x86/cpu/kvm: Provide UNTRAIN_RET_VM (git-fixes).\n- x86/cpu: Cleanup the untrain mess (git-fixes).\n- x86/cpu: Rename original retbleed methods (git-fixes).\n- x86/cpu: Rename srso_(.*)_alias to srso_alias_\\1 (git-fixes).\n- x86/retpoline: Do not clobber RFLAGS during srso_safe_ret() (git-fixes).\n- x86/speculation: Add cpu_show_gds() prototype (git-fixes).\n- x86/speculation: Mark all Skylake CPUs as vulnerable to GDS (git-fixes).\n- x86/srso: Correct the mitigation status when SMT is disabled (git-fixes).\n- x86/srso: Disable the mitigation on unaffected configurations (git-fixes).\n- x86/srso: Explain the untraining sequences a bit more (git-fixes).\n- x86: Move gds_ucode_mitigated() declaration to header (git-fixes).\n- xfs: fix sb write verify for lazysbcount (bsc#1214275).\n- xfs: gut error handling in xfs_trans_unreserve_and_mod_sb() (bsc#1214275).\n- xfs: update superblock counters correctly for !lazysbcount (bsc#1214275).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-3785,SUSE-SUSE-MicroOS-5.1-2023-3785,SUSE-SUSE-MicroOS-5.2-2023-3785", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3785-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:3785-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20233785-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:3785-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html", }, { category: "self", summary: "SUSE Bug 1023051", url: "https://bugzilla.suse.com/1023051", }, { category: "self", summary: "SUSE Bug 1203517", url: "https://bugzilla.suse.com/1203517", }, { category: "self", summary: "SUSE Bug 1210448", url: "https://bugzilla.suse.com/1210448", }, { category: "self", summary: "SUSE Bug 1213272", url: "https://bugzilla.suse.com/1213272", }, { category: "self", summary: "SUSE Bug 1213546", url: "https://bugzilla.suse.com/1213546", }, { category: "self", summary: "SUSE Bug 1213601", url: "https://bugzilla.suse.com/1213601", }, { category: "self", summary: "SUSE Bug 1213666", url: "https://bugzilla.suse.com/1213666", }, { category: "self", summary: "SUSE Bug 1213916", url: "https://bugzilla.suse.com/1213916", }, { category: "self", summary: "SUSE Bug 1213927", url: "https://bugzilla.suse.com/1213927", }, { category: "self", summary: "SUSE Bug 1213968", url: "https://bugzilla.suse.com/1213968", }, { category: "self", summary: "SUSE Bug 1213969", url: "https://bugzilla.suse.com/1213969", }, { category: "self", summary: "SUSE Bug 1213970", url: "https://bugzilla.suse.com/1213970", }, { category: "self", summary: "SUSE Bug 1213971", url: "https://bugzilla.suse.com/1213971", }, { category: "self", summary: "SUSE Bug 1214019", url: "https://bugzilla.suse.com/1214019", }, { category: "self", summary: "SUSE Bug 1214120", url: "https://bugzilla.suse.com/1214120", }, { category: "self", summary: "SUSE Bug 1214149", url: "https://bugzilla.suse.com/1214149", }, { category: "self", summary: "SUSE Bug 1214275", url: "https://bugzilla.suse.com/1214275", }, { category: "self", summary: "SUSE Bug 1214297", url: "https://bugzilla.suse.com/1214297", }, { category: "self", summary: "SUSE Bug 1214348", url: "https://bugzilla.suse.com/1214348", }, { category: "self", summary: "SUSE Bug 1214350", url: "https://bugzilla.suse.com/1214350", }, { category: "self", summary: "SUSE Bug 1214451", url: "https://bugzilla.suse.com/1214451", }, { category: "self", summary: "SUSE CVE CVE-2022-36402 page", url: "https://www.suse.com/security/cve/CVE-2022-36402/", }, { category: "self", summary: "SUSE CVE CVE-2023-2007 page", url: "https://www.suse.com/security/cve/CVE-2023-2007/", }, { category: "self", summary: "SUSE CVE CVE-2023-20588 page", url: "https://www.suse.com/security/cve/CVE-2023-20588/", }, { category: "self", summary: "SUSE CVE CVE-2023-21400 page", url: "https://www.suse.com/security/cve/CVE-2023-21400/", }, { category: "self", summary: "SUSE CVE CVE-2023-34319 page", url: "https://www.suse.com/security/cve/CVE-2023-34319/", }, { category: "self", summary: "SUSE CVE CVE-2023-3772 page", url: "https://www.suse.com/security/cve/CVE-2023-3772/", }, { category: "self", summary: "SUSE CVE CVE-2023-3863 page", url: "https://www.suse.com/security/cve/CVE-2023-3863/", }, { category: "self", summary: "SUSE CVE CVE-2023-4128 page", url: "https://www.suse.com/security/cve/CVE-2023-4128/", }, { category: "self", summary: "SUSE CVE CVE-2023-4132 page", url: "https://www.suse.com/security/cve/CVE-2023-4132/", }, { category: "self", summary: "SUSE CVE CVE-2023-4133 page", url: "https://www.suse.com/security/cve/CVE-2023-4133/", }, { category: "self", summary: "SUSE CVE CVE-2023-4134 page", url: "https://www.suse.com/security/cve/CVE-2023-4134/", }, { category: "self", summary: "SUSE CVE CVE-2023-4147 page", url: "https://www.suse.com/security/cve/CVE-2023-4147/", }, { category: "self", summary: "SUSE CVE CVE-2023-4194 page", url: "https://www.suse.com/security/cve/CVE-2023-4194/", }, { category: "self", summary: "SUSE CVE CVE-2023-4273 page", url: "https://www.suse.com/security/cve/CVE-2023-4273/", }, { category: "self", summary: "SUSE CVE CVE-2023-4385 page", url: "https://www.suse.com/security/cve/CVE-2023-4385/", }, { category: "self", summary: "SUSE CVE CVE-2023-4387 page", url: "https://www.suse.com/security/cve/CVE-2023-4387/", }, { category: "self", summary: "SUSE CVE CVE-2023-4459 page", url: "https://www.suse.com/security/cve/CVE-2023-4459/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-09-26T11:19:19Z", generator: { date: "2023-09-26T11:19:19Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:3785-1", initial_release_date: "2023-09-26T11:19:19Z", revision_history: [ { date: "2023-09-26T11:19:19Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-5.3.18-150300.141.1.noarch", product: { name: "kernel-devel-rt-5.3.18-150300.141.1.noarch", product_id: "kernel-devel-rt-5.3.18-150300.141.1.noarch", }, }, { category: "product_version", name: "kernel-source-rt-5.3.18-150300.141.1.noarch", product: { name: "kernel-source-rt-5.3.18-150300.141.1.noarch", product_id: "kernel-source-rt-5.3.18-150300.141.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-5.3.18-150300.141.1.x86_64", product: { name: "cluster-md-kmp-rt-5.3.18-150300.141.1.x86_64", product_id: "cluster-md-kmp-rt-5.3.18-150300.141.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-rt_debug-5.3.18-150300.141.1.x86_64", product: { name: "cluster-md-kmp-rt_debug-5.3.18-150300.141.1.x86_64", product_id: "cluster-md-kmp-rt_debug-5.3.18-150300.141.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-5.3.18-150300.141.1.x86_64", product: { name: "dlm-kmp-rt-5.3.18-150300.141.1.x86_64", product_id: "dlm-kmp-rt-5.3.18-150300.141.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt_debug-5.3.18-150300.141.1.x86_64", product: { name: "dlm-kmp-rt_debug-5.3.18-150300.141.1.x86_64", product_id: "dlm-kmp-rt_debug-5.3.18-150300.141.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-5.3.18-150300.141.1.x86_64", product: { name: "gfs2-kmp-rt-5.3.18-150300.141.1.x86_64", product_id: "gfs2-kmp-rt-5.3.18-150300.141.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt_debug-5.3.18-150300.141.1.x86_64", product: { name: "gfs2-kmp-rt_debug-5.3.18-150300.141.1.x86_64", product_id: "gfs2-kmp-rt_debug-5.3.18-150300.141.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-5.3.18-150300.141.1.x86_64", product: { name: "kernel-rt-5.3.18-150300.141.1.x86_64", product_id: "kernel-rt-5.3.18-150300.141.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-5.3.18-150300.141.1.x86_64", product: { name: "kernel-rt-devel-5.3.18-150300.141.1.x86_64", product_id: "kernel-rt-devel-5.3.18-150300.141.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-extra-5.3.18-150300.141.1.x86_64", product: { name: "kernel-rt-extra-5.3.18-150300.141.1.x86_64", product_id: "kernel-rt-extra-5.3.18-150300.141.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-devel-5.3.18-150300.141.1.x86_64", product: { name: "kernel-rt-livepatch-devel-5.3.18-150300.141.1.x86_64", product_id: "kernel-rt-livepatch-devel-5.3.18-150300.141.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-optional-5.3.18-150300.141.1.x86_64", product: { name: "kernel-rt-optional-5.3.18-150300.141.1.x86_64", product_id: "kernel-rt-optional-5.3.18-150300.141.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-5.3.18-150300.141.1.x86_64", product: { name: "kernel-rt_debug-5.3.18-150300.141.1.x86_64", product_id: "kernel-rt_debug-5.3.18-150300.141.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-5.3.18-150300.141.1.x86_64", product: { name: "kernel-rt_debug-devel-5.3.18-150300.141.1.x86_64", product_id: "kernel-rt_debug-devel-5.3.18-150300.141.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-extra-5.3.18-150300.141.1.x86_64", product: { name: "kernel-rt_debug-extra-5.3.18-150300.141.1.x86_64", product_id: "kernel-rt_debug-extra-5.3.18-150300.141.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-livepatch-devel-5.3.18-150300.141.1.x86_64", product: { name: "kernel-rt_debug-livepatch-devel-5.3.18-150300.141.1.x86_64", product_id: "kernel-rt_debug-livepatch-devel-5.3.18-150300.141.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-optional-5.3.18-150300.141.1.x86_64", product: { name: "kernel-rt_debug-optional-5.3.18-150300.141.1.x86_64", product_id: "kernel-rt_debug-optional-5.3.18-150300.141.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-5.3.18-150300.141.1.x86_64", product: { name: "kernel-syms-rt-5.3.18-150300.141.1.x86_64", product_id: "kernel-syms-rt-5.3.18-150300.141.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt-5.3.18-150300.141.1.x86_64", product: { name: "kselftests-kmp-rt-5.3.18-150300.141.1.x86_64", product_id: "kselftests-kmp-rt-5.3.18-150300.141.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt_debug-5.3.18-150300.141.1.x86_64", product: { name: "kselftests-kmp-rt_debug-5.3.18-150300.141.1.x86_64", product_id: "kselftests-kmp-rt_debug-5.3.18-150300.141.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-5.3.18-150300.141.1.x86_64", product: { name: "ocfs2-kmp-rt-5.3.18-150300.141.1.x86_64", product_id: "ocfs2-kmp-rt-5.3.18-150300.141.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt_debug-5.3.18-150300.141.1.x86_64", product: { name: "ocfs2-kmp-rt_debug-5.3.18-150300.141.1.x86_64", product_id: "ocfs2-kmp-rt_debug-5.3.18-150300.141.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt-5.3.18-150300.141.1.x86_64", product: { name: "reiserfs-kmp-rt-5.3.18-150300.141.1.x86_64", product_id: "reiserfs-kmp-rt-5.3.18-150300.141.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt_debug-5.3.18-150300.141.1.x86_64", product: { name: "reiserfs-kmp-rt_debug-5.3.18-150300.141.1.x86_64", product_id: "reiserfs-kmp-rt_debug-5.3.18-150300.141.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Micro 5.1", product: { name: "SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.2", product: { name: "SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-rt-5.3.18-150300.141.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", }, product_reference: "kernel-rt-5.3.18-150300.141.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.3.18-150300.141.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", }, product_reference: "kernel-rt-5.3.18-150300.141.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, ], }, vulnerabilities: [ { cve: "CVE-2022-36402", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-36402", }, ], notes: [ { category: "general", text: "An integer overflow vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-36402", url: "https://www.suse.com/security/cve/CVE-2022-36402", }, { category: "external", summary: "SUSE Bug 1203517 for CVE-2022-36402", url: "https://bugzilla.suse.com/1203517", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-26T11:19:19Z", details: "moderate", }, ], title: "CVE-2022-36402", }, { cve: "CVE-2023-2007", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2007", }, ], notes: [ { category: "general", text: "The specific flaw exists within the DPT I2O Controller driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2007", url: "https://www.suse.com/security/cve/CVE-2023-2007", }, { category: "external", summary: "SUSE Bug 1210448 for CVE-2023-2007", url: "https://bugzilla.suse.com/1210448", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-26T11:19:19Z", details: "moderate", }, ], title: "CVE-2023-2007", }, { cve: "CVE-2023-20588", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-20588", }, ], notes: [ { category: "general", text: "\nA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. \n\n\n\n\n\n\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-20588", url: "https://www.suse.com/security/cve/CVE-2023-20588", }, { category: "external", summary: "SUSE Bug 1213927 for CVE-2023-20588", url: "https://bugzilla.suse.com/1213927", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-26T11:19:19Z", details: "moderate", }, ], title: "CVE-2023-20588", }, { cve: "CVE-2023-21400", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-21400", }, ], notes: [ { category: "general", text: "In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-21400", url: "https://www.suse.com/security/cve/CVE-2023-21400", }, { category: "external", summary: "SUSE Bug 1213272 for CVE-2023-21400", url: "https://bugzilla.suse.com/1213272", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-26T11:19:19Z", details: "moderate", }, ], title: "CVE-2023-21400", }, { cve: "CVE-2023-34319", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-34319", }, ], notes: [ { category: "general", text: "The fix for XSA-423 added logic to Linux'es netback driver to deal with\na frontend splitting a packet in a way such that not all of the headers\nwould come in one piece. Unfortunately the logic introduced there\ndidn't account for the extreme case of the entire packet being split\ninto as many pieces as permitted by the protocol, yet still being\nsmaller than the area that's specially dealt with to keep all (possible)\nheaders together. Such an unusual packet would therefore trigger a\nbuffer overrun in the driver.\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-34319", url: "https://www.suse.com/security/cve/CVE-2023-34319", }, { category: "external", summary: "SUSE Bug 1213546 for CVE-2023-34319", url: "https://bugzilla.suse.com/1213546", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-26T11:19:19Z", details: "moderate", }, ], title: "CVE-2023-34319", }, { cve: "CVE-2023-3772", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3772", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3772", url: "https://www.suse.com/security/cve/CVE-2023-3772", }, { category: "external", summary: "SUSE Bug 1213666 for CVE-2023-3772", url: "https://bugzilla.suse.com/1213666", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-26T11:19:19Z", details: "moderate", }, ], title: "CVE-2023-3772", }, { cve: "CVE-2023-3863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3863", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC in the Linux kernel. This flaw allows a local user with special privileges to impact a kernel information leak issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3863", url: "https://www.suse.com/security/cve/CVE-2023-3863", }, { category: "external", summary: "SUSE Bug 1213601 for CVE-2023-3863", url: "https://bugzilla.suse.com/1213601", }, { category: "external", summary: "SUSE Bug 1213603 for CVE-2023-3863", url: "https://bugzilla.suse.com/1213603", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3863", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3863", url: "https://bugzilla.suse.com/1217531", }, { category: "external", summary: "SUSE Bug 1219704 for CVE-2023-3863", url: "https://bugzilla.suse.com/1219704", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-26T11:19:19Z", details: "moderate", }, ], title: "CVE-2023-3863", }, { cve: "CVE-2023-4128", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4128", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206, CVE-2023-4207, CVE-2023-4208 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4128", url: "https://www.suse.com/security/cve/CVE-2023-4128", }, { category: "external", summary: "SUSE Bug 1214149 for CVE-2023-4128", url: "https://bugzilla.suse.com/1214149", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-26T11:19:19Z", details: "moderate", }, ], title: "CVE-2023-4128", }, { cve: "CVE-2023-4132", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4132", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability was found in the siano smsusb module in the Linux kernel. The bug occurs during device initialization when the siano device is plugged in. This flaw allows a local user to crash the system, causing a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4132", url: "https://www.suse.com/security/cve/CVE-2023-4132", }, { category: "external", summary: "SUSE Bug 1213969 for CVE-2023-4132", url: "https://bugzilla.suse.com/1213969", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-26T11:19:19Z", details: "moderate", }, ], title: "CVE-2023-4132", }, { cve: "CVE-2023-4133", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4133", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability was found in the cxgb4 driver in the Linux kernel. The bug occurs when the cxgb4 device is detaching due to a possible rearming of the flower_stats_timer from the work queue. This flaw allows a local user to crash the system, causing a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4133", url: "https://www.suse.com/security/cve/CVE-2023-4133", }, { category: "external", summary: "SUSE Bug 1213970 for CVE-2023-4133", url: "https://bugzilla.suse.com/1213970", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-26T11:19:19Z", details: "moderate", }, ], title: "CVE-2023-4133", }, { cve: "CVE-2023-4134", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4134", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4134", url: "https://www.suse.com/security/cve/CVE-2023-4134", }, { category: "external", summary: "SUSE Bug 1213971 for CVE-2023-4134", url: "https://bugzilla.suse.com/1213971", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-26T11:19:19Z", details: "moderate", }, ], title: "CVE-2023-4134", }, { cve: "CVE-2023-4147", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4147", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in the Linux kernel's Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4147", url: "https://www.suse.com/security/cve/CVE-2023-4147", }, { category: "external", summary: "SUSE Bug 1213968 for CVE-2023-4147", url: "https://bugzilla.suse.com/1213968", }, { category: "external", summary: "SUSE Bug 1215118 for CVE-2023-4147", url: "https://bugzilla.suse.com/1215118", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-26T11:19:19Z", details: "important", }, ], title: "CVE-2023-4147", }, { cve: "CVE-2023-4194", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4194", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 (\"tun: tun_chr_open(): correctly initialize socket uid\"), - 66b2c338adce (\"tap: tap_open(): correctly initialize socket uid\"), pass \"inode->i_uid\" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4194", url: "https://www.suse.com/security/cve/CVE-2023-4194", }, { category: "external", summary: "SUSE Bug 1214019 for CVE-2023-4194", url: "https://bugzilla.suse.com/1214019", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-26T11:19:19Z", details: "moderate", }, ], title: "CVE-2023-4194", }, { cve: "CVE-2023-4273", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4273", }, ], notes: [ { category: "general", text: "A flaw was found in the exFAT driver of the Linux kernel. The vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this flaw to overflow the kernel stack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4273", url: "https://www.suse.com/security/cve/CVE-2023-4273", }, { category: "external", summary: "SUSE Bug 1214120 for CVE-2023-4273", url: "https://bugzilla.suse.com/1214120", }, { category: "external", summary: "SUSE Bug 1214123 for CVE-2023-4273", url: "https://bugzilla.suse.com/1214123", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-26T11:19:19Z", details: "important", }, ], title: "CVE-2023-4273", }, { cve: "CVE-2023-4385", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4385", }, ], notes: [ { category: "general", text: "A NULL pointer dereference flaw was found in dbFree in fs/jfs/jfs_dmap.c in the journaling file system (JFS) in the Linux Kernel. This issue may allow a local attacker to crash the system due to a missing sanity check.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4385", url: "https://www.suse.com/security/cve/CVE-2023-4385", }, { category: "external", summary: "SUSE Bug 1214348 for CVE-2023-4385", url: "https://bugzilla.suse.com/1214348", }, { category: "external", summary: "SUSE Bug 1222212 for CVE-2023-4385", url: "https://bugzilla.suse.com/1222212", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-26T11:19:19Z", details: "moderate", }, ], title: "CVE-2023-4385", }, { cve: "CVE-2023-4387", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4387", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in vmxnet3_rq_alloc_rx_buf in drivers/net/vmxnet3/vmxnet3_drv.c in VMware's vmxnet3 ethernet NIC driver in the Linux Kernel. This issue could allow a local attacker to crash the system due to a double-free while cleaning up vmxnet3_rq_cleanup_all, which could also lead to a kernel information leak problem.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4387", url: "https://www.suse.com/security/cve/CVE-2023-4387", }, { category: "external", summary: "SUSE Bug 1214350 for CVE-2023-4387", url: "https://bugzilla.suse.com/1214350", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-26T11:19:19Z", details: "moderate", }, ], title: "CVE-2023-4387", }, { cve: "CVE-2023-4459", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4459", }, ], notes: [ { category: "general", text: "A NULL pointer dereference flaw was found in vmxnet3_rq_cleanup in drivers/net/vmxnet3/vmxnet3_drv.c in the networking sub-component in vmxnet3 in the Linux Kernel. This issue may allow a local attacker with normal user privilege to cause a denial of service due to a missing sanity check during cleanup.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4459", url: "https://www.suse.com/security/cve/CVE-2023-4459", }, { category: "external", summary: "SUSE Bug 1214451 for CVE-2023-4459", url: "https://bugzilla.suse.com/1214451", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.141.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.141.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-09-26T11:19:19Z", details: "moderate", }, ], title: "CVE-2023-4459", }, ], }
suse-su-2023:3376-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2023-20569: Fixed side channel attack ‘Inception’ or ‘RAS Poisoning’ (bsc#1213287).\n- CVE-2023-3268: Fixed an out of bounds memory access flaw in relay_file_read_start_pos in the relayfs (bsc#1212502).\n- CVE-2023-2166: Fixed NULL pointer dereference in can_rcv_filter (bsc#1210627).\n- CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec (bsc#1211738).\n- CVE-2023-4004: Fixed improper element removal netfilter nft_set_pipapo (bsc#1213812).\n- CVE-2023-2156: Fixed a flaw in the networking subsystem within the handling of the RPL protocol (bsc#1211131).\n- CVE-2023-21400: Fixed several memory corruptions due to improper locking in io_uring (bsc#1213272).\n- CVE-2023-3776: Fixed improper refcount update in cls_fw leads to use-after-free (bsc#1213588).\n- CVE-2023-3863: Fixed a use-after-free flaw in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC. This flaw allowed a local user with special privileges to impact a kernel information leak issue (bsc#1213601).\n- CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c (bsc#1213167).\n- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).\n- CVE-2023-3609: Fixed reference counter leak leading to overflow in net/sched (bsc#1213586).\n- CVE-2023-3611: Fixed an out-of-bounds write in net/sched sch_qfq(bsc#1213585).\n- CVE-2023-38409: Fixed an issue in set_con2fb_map in drivers/video/fbdev/core/fbcon.c. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info) (bsc#1213417).\n- CVE-2022-40982: Fixed transient execution attack called 'Gather Data Sampling' (bsc#1206418).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Add ACPI disabled check to acpi_cpc_valid() (bsc#1212445).\n- ACPI: CPPC: Add definition for undefined FADT preferred PM profile value (bsc#1212445).\n- ACPI: utils: Fix acpi_evaluate_dsm_typed() redefinition error (git-fixes).\n- ACPI/IORT: Remove erroneous id_count check in iort_node_get_rmr_info() (git-fixes).\n- afs: Adjust ACK interpretation to try and cope with NAT (git-fixes).\n- afs: Fix access after dec in put functions (git-fixes).\n- afs: Fix afs_getattr() to refetch file status if callback break occurred (git-fixes).\n- afs: Fix dynamic root getattr (git-fixes).\n- afs: Fix fileserver probe RTT handling (git-fixes).\n- afs: Fix infinite loop found by xfstest generic/676 (git-fixes).\n- afs: Fix lost servers_outstanding count (git-fixes).\n- afs: Fix server->active leak in afs_put_server (git-fixes).\n- afs: Fix setting of mtime when creating a file/dir/symlink (git-fixes).\n- afs: Fix updating of i_size with dv jump from server (git-fixes).\n- afs: Fix vlserver probe RTT handling (git-fixes).\n- afs: Return -EAGAIN, not -EREMOTEIO, when a file already locked (git-fixes).\n- afs: Use refcount_t rather than atomic_t (git-fixes).\n- afs: Use the operation issue time instead of the reply time for callbacks (git-fixes).\n- ALSA: emu10k1: roll up loops in DSP setup code for Audigy (git-fixes).\n- ALSA: hda/realtek - remove 3k pull low procedure (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NS70AU (git-fixes).\n- ALSA: hda/realtek: Add support for DELL Oasis 13/14/16 laptops (git-fixes).\n- ALSA: hda/realtek: Enable Mute LED on HP Laptop 15s-eq2xxx (git-fixes).\n- ALSA: hda/realtek: Fix generic fixup definition for cs35l41 amp (git-fixes).\n- ALSA: hda/realtek: Support ASUS G713PV laptop (git-fixes).\n- ALSA: hda/relatek: Enable Mute LED on HP 250 G8 (git-fixes).\n- ALSA: usb-audio: Add FIXED_RATE quirk for JBL Quantum610 Wireless (git-fixes).\n- ALSA: usb-audio: Add new quirk FIXED_RATE for JBL Quantum810 Wireless (git-fixes).\n- ALSA: usb-audio: Add quirk for Microsoft Modern Wireless Headset (bsc#1207129).\n- ALSA: usb-audio: Add quirk for Tascam Model 12 (git-fixes).\n- ALSA: usb-audio: Always initialize fixed_rate in snd_usb_find_implicit_fb_sync_format() (git-fixes).\n- ALSA: usb-audio: Apply mutex around snd_usb_endpoint_set_params() (git-fixes).\n- ALSA: usb-audio: Avoid superfluous endpoint setup (git-fixes).\n- ALSA: usb-audio: Avoid unnecessary interface change at EP close (git-fixes).\n- ALSA: usb-audio: Clear fixed clock rate at closing EP (git-fixes).\n- ALSA: usb-audio: Correct the return code from snd_usb_endpoint_set_params() (git-fixes).\n- ALSA: usb-audio: Drop superfluous interface setup at parsing (git-fixes).\n- ALSA: usb-audio: Fix possible NULL pointer dereference in snd_usb_pcm_has_fixed_rate() (git-fixes).\n- ALSA: usb-audio: Fix wrong kfree issue in snd_usb_endpoint_free_all (git-fixes).\n- ALSA: usb-audio: More refactoring of hw constraint rules (git-fixes).\n- ALSA: usb-audio: Properly refcounting clock rate (git-fixes).\n- ALSA: usb-audio: Rate limit usb_set_interface error reporting (git-fixes).\n- ALSA: usb-audio: Refcount multiple accesses on the single clock (git-fixes).\n- ALSA: usb-audio: Split endpoint setups for hw_params and prepare (take#2) (git-fixes).\n- ALSA: usb-audio: Update for native DSD support quirks (git-fixes).\n- ALSA: usb-audio: Use atomic_try_cmpxchg in ep_state_update (git-fixes).\n- ALSA: usb-audio: Workaround for XRUN at prepare (git-fixes).\n- amd-pstate: Fix amd_pstate mode switch (git-fixes).\n- ASoC: amd: acp: fix for invalid dai id handling in acp_get_byte_count() (git-fixes).\n- ASoC: atmel: Fix the 8K sample parameter in I2SC master (git-fixes).\n- ASoc: codecs: ES8316: Fix DMIC config (git-fixes).\n- ASoC: codecs: wcd-mbhc-v2: fix resource leaks on component remove (git-fixes).\n- ASoC: codecs: wcd934x: fix resource leaks on component remove (git-fixes).\n- ASoC: codecs: wcd938x: fix codec initialisation race (git-fixes).\n- ASoC: codecs: wcd938x: fix dB range for HPHL and HPHR (git-fixes).\n- ASoC: codecs: wcd938x: fix missing clsh ctrl error handling (git-fixes).\n- ASoC: codecs: wcd938x: fix soundwire initialisation race (git-fixes).\n- ASoC: da7219: Check for failure reading AAD IRQ events (git-fixes).\n- ASoC: da7219: Flush pending AAD IRQ when suspending (git-fixes).\n- ASoC: fsl_sai: Disable bit clock with transmitter (git-fixes).\n- ASoC: fsl_spdif: Silence output on stop (git-fixes).\n- ASoC: rt5640: Fix sleep in atomic context (git-fixes).\n- ASoC: rt5682-sdw: fix for JD event handling in ClockStop Mode0 (git-fixes).\n- ASoC: rt711-sdca: fix for JD event handling in ClockStop Mode0 (git-fixes).\n- ASoC: rt711: fix for JD event handling in ClockStop Mode0 (git-fixes).\n- ASoC: SOF: ipc3-dtrace: uninitialized data in dfsentry_trace_filter_write() (git-fixes).\n- ASoC: tegra: Fix ADX byte map (git-fixes).\n- ASoC: tegra: Fix AMX byte map (git-fixes).\n- ASoC: wm8904: Fill the cache for WM8904_ADC_TEST_0 register (git-fixes).\n- ata: pata_ns87415: mark ns87560_tf_read static (git-fixes).\n- block, bfq: Fix division by zero error on zero wsum (bsc#1213653).\n- block: Fix a source code comment in include/uapi/linux/blkzoned.h (git-fixes).\n- Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO (bsc#1210780 CVE-2023-31083).\n- bpf: add missing header file include (bsc#1211738 CVE-2023-0459).\n- bus: mhi: add new interfaces to handle MHI channels directly (bsc#1207948).\n- bus: mhi: host: add destroy_device argument to mhi_power_down() (bsc#1207948).\n- can: af_can: fix NULL pointer dereference in can_rcv_filter (bsc#1210627 CVE-2023-2166).\n- can: af_can: fix NULL pointer dereference in can_rcv_filter (bsc#1210627 CVE-2023-2166).\n- can: gs_usb: gs_can_close(): add missing set of CAN state to CAN_STATE_STOPPED (git-fixes).\n- ceph: do not let check_caps skip sending responses for revoke msgs (bsc#1213856).\n- coda: Avoid partial allocation of sig_inputArgs (git-fixes).\n- cpufreq: amd_pstate: fix wrong lowest perf fetch (bsc#1212445).\n- cpufreq: amd_pstate: map desired perf into pstate scope for powersave governor (bsc#1212445).\n- cpufreq: amd-pstate: Add ->fast_switch() callback (bsc#1212445).\n- cpufreq: amd-pstate: Add AMD P-State frequencies attributes (bsc#1212445).\n- cpufreq: amd-pstate: Add AMD P-State performance attributes (bsc#1212445).\n- cpufreq: amd-pstate: add amd-pstate driver parameter for mode selection (bsc#1212445).\n- cpufreq: amd-pstate: Add boost mode support for AMD P-State (bsc#1212445).\n- cpufreq: amd-pstate: add driver working mode switch support (bsc#1212445).\n- cpufreq: amd-pstate: Add fast switch function for AMD P-State (bsc#1212445).\n- cpufreq: amd-pstate: Add guided autonomous mode (bsc#1212445).\n- cpufreq: amd-pstate: Add guided mode control support via sysfs (bsc#1212445).\n- cpufreq: amd-pstate: Add more tracepoint for AMD P-State module (bsc#1212445).\n- cpufreq: amd-pstate: Add resume and suspend callbacks (bsc#1212445).\n- cpufreq: amd-pstate: Add trace for AMD P-State module (bsc#1212445).\n- cpufreq: amd-pstate: avoid uninitialized variable use (bsc#1212445).\n- cpufreq: amd-pstate: change amd-pstate driver to be built-in type (bsc#1212445).\n- cpufreq: amd-pstate: convert sprintf with sysfs_emit() (bsc#1212445).\n- cpufreq: amd-pstate: cpufreq: amd-pstate: reset MSR_AMD_PERF_CTL register at init (bsc#1212445).\n- cpufreq: amd-pstate: Expose struct amd_cpudata (bsc#1212445).\n- cpufreq: amd-pstate: Fix initial highest_perf value (bsc#1212445).\n- cpufreq: amd-pstate: Fix invalid write to MSR_AMD_CPPC_REQ (bsc#1212445).\n- cpufreq: amd-pstate: Fix Kconfig dependencies for AMD P-State (bsc#1212445).\n- cpufreq: amd-pstate: fix kernel hang issue while amd-pstate unregistering (bsc#1212445).\n- cpufreq: amd-pstate: Fix struct amd_cpudata kernel-doc comment (bsc#1212445).\n- cpufreq: amd-pstate: fix white-space (bsc#1212445).\n- cpufreq: amd-pstate: implement amd pstate cpu online and offline callback (bsc#1212445).\n- cpufreq: amd-pstate: implement Pstate EPP support for the AMD processors (bsc#1212445).\n- cpufreq: amd-pstate: implement suspend and resume callbacks (bsc#1212445).\n- cpufreq: amd-pstate: Introduce a new AMD P-State driver to support future processors (bsc#1212445).\n- cpufreq: amd-pstate: Introduce the support for the processors with shared memory solution (bsc#1212445).\n- cpufreq: amd-pstate: Let user know amd-pstate is disabled (bsc#1212445).\n- cpufreq: amd-pstate: Make amd-pstate EPP driver name hyphenated (bsc#1212445).\n- cpufreq: amd-pstate: Make varaiable mode_state_machine static (bsc#1212445).\n- cpufreq: amd-pstate: optimize driver working mode selection in amd_pstate_param() (bsc#1212445).\n- cpufreq: amd-pstate: Remove fast_switch_possible flag from active driver (bsc#1212445).\n- cpufreq: amd-pstate: remove MODULE_LICENSE in non-modules (bsc#1212445).\n- cpufreq: amd-pstate: Set a fallback policy based on preferred_profile (bsc#1212445).\n- cpufreq: amd-pstate: simplify cpudata pointer assignment (bsc#1212445).\n- cpufreq: amd-pstate: Update policy->cur in amd_pstate_adjust_perf() (bsc#1212445).\n- cpufreq: amd-pstate: update pstate frequency transition delay time (bsc#1212445).\n- cpufreq: amd-pstate: Write CPPC enable bit per-socket (bsc#1212445).\n- crypto: kpp - Add helper to set reqsize (git-fixes).\n- crypto: qat - Use helper to set reqsize (git-fixes).\n- dlm: fix missing lkb refcount handling (git-fixes).\n- dlm: fix plock invalid read (git-fixes).\n- Documentation: cpufreq: amd-pstate: Move amd_pstate param to alphabetical order (bsc#1212445).\n- Documentation: devices.txt: reconcile serial/ucc_uart minor numers (git-fixes).\n- drm/amd: Fix an error handling mistake in psp_sw_init() (git-fixes).\n- drm/amd/display: Add monitor specific edid quirk (git-fixes).\n- drm/amd/display: Add polling method to handle MST reply packet (bsc#1213578).\n- drm/amd/display: check TG is non-null before checking if enabled (git-fixes).\n- drm/amd/display: Correct `DMUB_FW_VERSION` macro (git-fixes).\n- drm/amd/display: Disable MPC split by default on special asic (git-fixes).\n- drm/amd/display: fix access hdcp_workqueue assert (git-fixes).\n- drm/amd/display: fix seamless odm transitions (git-fixes).\n- drm/amd/display: Keep PHY active for DP displays on DCN31 (git-fixes).\n- drm/amd/display: only accept async flips for fast updates (git-fixes).\n- drm/amd/display: Only update link settings after successful MST link train (git-fixes).\n- drm/amd/display: phase3 mst hdcp for multiple displays (git-fixes).\n- drm/amd/display: Remove Phantom Pipe Check When Calculating K1 and K2 (git-fixes).\n- drm/amd/display: save restore hdcp state when display is unplugged from mst hub (git-fixes).\n- drm/amd/display: Unlock on error path in dm_handle_mst_sideband_msg_ready_event() (git-fixes).\n- drm/amd/pm: add abnormal fan detection for smu 13.0.0 (git-fixes).\n- drm/amd/pm: conditionally disable pcie lane/speed switching for SMU13 (git-fixes).\n- drm/amd/pm: re-enable the gfx imu when smu resume (git-fixes).\n- drm/amd/pm: share the code around SMU13 pcie parameters update (git-fixes).\n- drm/amdgpu: add the fan abnormal detection feature (git-fixes).\n- drm/amdgpu: avoid restore process run into dead loop (git-fixes).\n- drm/amdgpu: fix clearing mappings for BOs that are always valid in VM (git-fixes).\n- drm/amdgpu: Fix minmax warning (git-fixes).\n- drm/atomic: Allow vblank-enabled + self-refresh 'disable' (git-fixes).\n- drm/atomic: Fix potential use-after-free in nonblocking commits (git-fixes).\n- drm/bridge: tc358768: Add atomic_get_input_bus_fmts() implementation (git-fixes).\n- drm/bridge: tc358768: fix TCLK_TRAILCNT computation (git-fixes).\n- drm/bridge: tc358768: fix THS_TRAILCNT computation (git-fixes).\n- drm/bridge: tc358768: fix THS_ZEROCNT computation (git-fixes).\n- drm/bridge: ti-sn65dsi86: Fix auxiliary bus lifetime (git-fixes).\n- drm/client: Fix memory leak in drm_client_modeset_probe (git-fixes).\n- drm/dp_mst: Clear MSG_RDY flag before sending new message (bsc#1213578).\n- drm/i915: Do not preserve dpll_hw_state for slave crtc in Bigjoiner (git-fixes).\n- drm/i915: Fix an error handling path in igt_write_huge() (git-fixes).\n- drm/i915/dpt: Use shmem for dpt objects (git-fixes).\n- drm/i915/tc: Fix system resume MST mode restore for DP-alt sinks (git-fixes).\n- drm/msm: Fix IS_ERR_OR_NULL() vs NULL check in a5xx_submit_in_rb() (git-fixes).\n- drm/msm/adreno: Fix snapshot BINDLESS_DATA size (git-fixes).\n- drm/msm/disp/dpu: get timing engine status from intf status register (git-fixes).\n- drm/msm/dpu: drop enum dpu_core_perf_data_bus_id (git-fixes).\n- drm/msm/dpu: Set DPU_DATA_HCTL_EN for in INTF_SC7180_MASK (git-fixes).\n- drm/radeon: Fix integer overflow in radeon_cs_parser_init (git-fixes).\n- drm/ttm: fix bulk_move corruption when adding a entry (git-fixes).\n- drm/ttm: fix warning that we shouldn't mix (git-fixes).\n- drm/vmwgfx: Fix Legacy Display Unit atomic drm support (bsc#1213632).\n- drm/vmwgfx: Remove explicit and broken vblank handling (bsc#1213632).\n- drm/vmwgfx: Remove rcu locks from user resources (bsc#1213632).\n- fbdev: au1200fb: Fix missing IRQ check in au1200fb_drv_probe (git-fixes).\n- fbdev: imxfb: Removed unneeded release_mem_region (git-fixes).\n- fbdev: imxfb: warn about invalid left/right margin (git-fixes).\n- file: always lock position for FMODE_ATOMIC_POS (bsc#1213759).\n- fs: dlm: add midcomms init/start functions (git-fixes).\n- fs: dlm: do not set stop rx flag after node reset (git-fixes).\n- fs: dlm: filter user dlm messages for kernel locks (git-fixes).\n- fs: dlm: fix log of lowcomms vs midcomms (git-fixes).\n- fs: dlm: fix race between test_bit() and queue_work() (git-fixes).\n- fs: dlm: fix race in lowcomms (git-fixes).\n- fs: dlm: handle -EBUSY first in lock arg validation (git-fixes).\n- fs: dlm: move sending fin message into state change handling (git-fixes).\n- fs: dlm: retry accept() until -EAGAIN or error returns (git-fixes).\n- fs: dlm: return positive pid value for F_GETLK (git-fixes).\n- fs: dlm: start midcomms before scand (git-fixes).\n- fs: hfsplus: remove WARN_ON() from hfsplus_cat_{read,write}_inode() (git-fixes).\n- FS: JFS: Check for read-only mounted filesystem in txBegin (git-fixes).\n- FS: JFS: Fix null-ptr-deref Read in txBegin (git-fixes).\n- fs: jfs: Fix UBSAN: array-index-out-of-bounds in dbAllocDmapLev (git-fixes).\n- gve: Set default duplex configuration to full (git-fixes).\n- gve: unify driver name usage (git-fixes).\n- hwmon: (adm1275) Allow setting sample averaging (git-fixes).\n- hwmon: (k10temp) Enable AMD3255 Proc to show negative temperature (git-fixes).\n- hwmon: (nct7802) Fix for temp6 (PECI1) processed even if PECI1 disabled (git-fixes).\n- hwmon: (pmbus/adm1275) Fix problems with temperature monitoring on ADM1272 (git-fixes).\n- i2c: xiic: Defer xiic_wakeup() and __xiic_start_xfer() in xiic_process() (git-fixes).\n- i2c: xiic: Do not try to handle more interrupt events after error (git-fixes).\n- iavf: check for removal state before IAVF_FLAG_PF_COMMS_FAILED (git-fixes).\n- iavf: fix a deadlock caused by rtnl and driver's lock circular dependencies (git-fixes).\n- iavf: Fix out-of-bounds when setting channels on remove (git-fixes).\n- iavf: fix potential deadlock on allocation failure (git-fixes).\n- iavf: fix reset task race with iavf_remove() (git-fixes).\n- iavf: Fix use-after-free in free_netdev (git-fixes).\n- iavf: Move netdev_update_features() into watchdog task (git-fixes).\n- iavf: use internal state to free traffic IRQs (git-fixes).\n- iavf: Wait for reset in callbacks which trigger it (git-fixes).\n- IB/hfi1: Use bitmap_zalloc() when applicable (git-fixes)\n- ice: Fix max_rate check while configuring TX rate limits (git-fixes).\n- ice: Fix memory management in ice_ethtool_fdir.c (git-fixes).\n- ice: handle extts in the miscellaneous interrupt thread (git-fixes).\n- igc: Check if hardware TX timestamping is enabled earlier (git-fixes).\n- igc: Enable and fix RX hash usage by netstack (git-fixes).\n- igc: Fix inserting of empty frame for launchtime (git-fixes).\n- igc: Fix Kernel Panic during ndo_tx_timeout callback (git-fixes).\n- igc: Fix launchtime before start of cycle (git-fixes).\n- igc: Fix race condition in PTP tx code (git-fixes).\n- igc: Handle PPS start time programming for past time values (git-fixes).\n- igc: Prevent garbled TX queue with XDP ZEROCOPY (git-fixes).\n- igc: Remove delay during TX ring configuration (git-fixes).\n- igc: set TP bit in 'supported' and 'advertising' fields of ethtool_link_ksettings (git-fixes).\n- igc: Work around HW bug causing missing timestamps (git-fixes).\n- Input: i8042 - add Clevo PCX0DX to i8042 quirk table (git-fixes).\n- Input: iqs269a - do not poll during ATI (git-fixes).\n- Input: iqs269a - do not poll during suspend or resume (git-fixes).\n- io_uring: ensure IOPOLL locks around deferred work (bsc#1213272 CVE-2023-21400).\n- ipv6: rpl: Fix Route of Death (CVE-2023-2156 bsc#1211131).\n- jffs2: fix memory leak in jffs2_do_fill_super (git-fixes).\n- jffs2: fix memory leak in jffs2_do_mount_fs (git-fixes).\n- jffs2: fix memory leak in jffs2_scan_medium (git-fixes).\n- jffs2: fix use-after-free in jffs2_clear_xattr_subsystem (git-fixes).\n- jffs2: GC deadlock reading a page that is used in jffs2_write_begin() (git-fixes).\n- jffs2: reduce stack usage in jffs2_build_xattr_subsystem() (git-fixes).\n- jfs: jfs_dmap: Validate db_l2nbperpage while mounting (git-fixes).\n- kabi/severities: relax kABI for ath11k local symbols (bsc#1207948)\n- kselftest: vDSO: Fix accumulation of uninitialized ret when CLOCK_REALTIME is undefined (git-fixes).\n- KVM: Add GDS_NO support to KVM (bsc#1206418, CVE-2022-40982).\n- KVM: arm64: Do not read a HW interrupt pending state in user context (git-fixes)\n- KVM: arm64: Warn if accessing timer pending state outside of vcpu (bsc#1213620)\n- KVM: Do not null dereference ops->destroy (git-fixes)\n- KVM: downgrade two BUG_ONs to WARN_ON_ONCE (git-fixes)\n- KVM: Initialize debugfs_dentry when a VM is created to avoid NULL (git-fixes)\n- KVM: s390: pv: fix index value of replaced ASCE (git-fixes bsc#1213867).\n- KVM: VMX: Inject #GP on ENCLS if vCPU has paging disabled (CR0.PG==0) (git-fixes).\n- KVM: VMX: Inject #GP, not #UD, if SGX2 ENCLS leafs are unsupported (git-fixes).\n- KVM: VMX: restore vmx_vmexit alignment (git-fixes).\n- KVM: x86: Account fastpath-only VM-Exits in vCPU stats (git-fixes).\n- leds: trigger: netdev: Recheck NETDEV_LED_MODE_LINKUP on dev rename (git-fixes).\n- libceph: harden msgr2.1 frame segment length checks (bsc#1213857).\n- md: add error_handlers for raid0 and linear (bsc#1212766).\n- media: staging: atomisp: select V4L2_FWNODE (git-fixes).\n- mhi_power_down() kABI workaround (bsc#1207948).\n- mmc: core: disable TRIM on Kingston EMMC04G-M627 (git-fixes).\n- mmc: sdhci: fix DMA configure compatibility issue when 64bit DMA mode is used (git-fixes).\n- net: ena: fix shift-out-of-bounds in exponential backoff (git-fixes).\n- net: mana: Batch ringing RX queue doorbell on receiving packets (bsc#1212901).\n- net: mana: Use the correct WQE count for ringing RQ doorbell (bsc#1212901).\n- net: nfc: Fix use-after-free caused by nfc_llcp_find_local (bsc#1213601 CVE-2023-3863).\n- net: phy: marvell10g: fix 88x3310 power up (git-fixes).\n- net/mlx5: DR, Support SW created encap actions for FW table (git-fixes).\n- net/mlx5e: Check for NOT_READY flag state after locking (git-fixes).\n- net/mlx5e: fix double free in mlx5e_destroy_flow_table (git-fixes).\n- net/mlx5e: fix memory leak in mlx5e_fs_tt_redirect_any_create (git-fixes).\n- net/mlx5e: fix memory leak in mlx5e_ptp_open (git-fixes).\n- net/mlx5e: XDP, Allow growing tail for XDP multi buffer (git-fixes).\n- net/mlx5e: xsk: Set napi_id to support busy polling on XSK RQ (git-fixes).\n- net/sched: cls_fw: Fix improper refcount update leads to use-after-free (CVE-2023-3776 bsc#1213588).\n- net/sched: cls_u32: Fix reference counter leak leading to overflow (CVE-2023-3609 bsc#1213586).\n- net/sched: sch_qfq: account for stab overhead in qfq_enqueue (CVE-2023-3611 bsc#1213585).\n- net/sched: sch_qfq: refactor parsing of netlink parameters (bsc#1213585).\n- net/sched: sch_qfq: reintroduce lmax bound check for MTU (bsc#1213585).\n- netfilter: nft_set_pipapo: fix improper element removal (bsc#1213812 CVE-2023-4004).\n- nfc: llcp: simplify llcp_sock_connect() error paths (bsc#1213601 CVE-2023-3863).\n- nfsd: add encoding of op_recall flag for write delegation (git-fixes).\n- nfsd: fix double fget() bug in __write_ports_addfd() (git-fixes).\n- nfsd: Fix sparse warning (git-fixes).\n- nfsd: Remove open coding of string copy (git-fixes).\n- NFSv4.1: Always send a RECLAIM_COMPLETE after establishing lease (git-fixes).\n- NFSv4.1: freeze the session table upon receiving NFS4ERR_BADSESSION (git-fixes).\n- nvme-pci: fix DMA direction of unmapping integrity data (git-fixes).\n- nvme-pci: remove nvme_queue from nvme_iod (git-fixes).\n- nvme: do not reject probe due to duplicate IDs for single-ported PCIe devices (git-fixes).\n- nvme: fix the NVME_ID_NS_NVM_STS_MASK definition (git-fixes).\n- octeontx-af: fix hardware timestamp configuration (git-fixes).\n- octeontx2-af: Move validation of ptp pointer before its usage (git-fixes).\n- octeontx2-pf: Add additional check for MCAM rules (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 88SE9235 (git-fixes).\n- PCI/PM: Avoid putting EloPOS E2/S2/H2 PCIe Ports in D3cold (git-fixes).\n- phy: hisilicon: Fix an out of bounds check in hisi_inno_phy_probe() (git-fixes).\n- pinctrl: amd: Detect internal GPIO0 debounce handling (git-fixes).\n- pinctrl: amd: Do not show Invalid config param errors (git-fixes).\n- pinctrl: amd: Fix mistake in handling clearing pins at startup (git-fixes).\n- pinctrl: amd: Only use special debounce behavior for GPIO 0 (git-fixes).\n- pinctrl: amd: Use amd_pinconf_set() for all config options (git-fixes).\n- platform/x86: msi-laptop: Fix rfkill out-of-sync on MSI Wind U100 (git-fixes).\n- RDMA/bnxt_re: Fix hang during driver unload (git-fixes)\n- RDMA/bnxt_re: Prevent handling any completions after qp destroy (git-fixes)\n- RDMA/core: Update CMA destination address on rdma_resolve_addr (git-fixes)\n- RDMA/irdma: Add missing read barriers (git-fixes)\n- RDMA/irdma: Fix data race on CQP completion stats (git-fixes)\n- RDMA/irdma: Fix data race on CQP request done (git-fixes)\n- RDMA/irdma: Fix op_type reporting in CQEs (git-fixes)\n- RDMA/irdma: Report correct WC error (git-fixes)\n- RDMA/mlx4: Make check for invalid flags stricter (git-fixes)\n- RDMA/mthca: Fix crash when polling CQ for shared QPs (git-fixes)\n- regmap: Account for register length in SMBus I/O limits (git-fixes).\n- regmap: Drop initial version of maximum transfer length fixes (git-fixes).\n- relayfs: fix out-of-bounds access in relay_file_read (bsc#1212502 CVE-2023-3268).\n- rxrpc, afs: Fix selection of abort codes (git-fixes).\n- s390: introduce nospec_uses_trampoline() (git-fixes bsc#1213870).\n- s390/bpf: Add expoline to tail calls (git-fixes bsc#1213870).\n- s390/dasd: fix hanging device after quiesce/resume (git-fixes bsc#1213810).\n- s390/dasd: print copy pair message only for the correct error (git-fixes bsc#1213872).\n- s390/decompressor: specify __decompress() buf len to avoid overflow (git-fixes bsc#1213863).\n- s390/ipl: add missing intersection check to ipl_report handling (git-fixes bsc#1213871).\n- s390/qeth: Fix vipa deletion (git-fixes bsc#1213713).\n- s390/vmem: fix empty page tables cleanup under KASAN (git-fixes bsc#1213715).\n- scftorture: Count reschedule IPIs (git-fixes).\n- scsi: lpfc: Abort outstanding ELS cmds when mailbox timeout error is detected (bsc#1213756).\n- scsi: lpfc: Avoid -Wstringop-overflow warning (bsc#1213756).\n- scsi: lpfc: Clean up SLI-4 sysfs resource reporting (bsc#1213756).\n- scsi: lpfc: Copyright updates for 14.2.0.14 patches (bsc#1213756).\n- scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() (bsc#1213756).\n- scsi: lpfc: Fix incorrect big endian type assignment in bsg loopback path (bsc#1213756).\n- scsi: lpfc: Fix incorrect big endian type assignments in FDMI and VMID paths (bsc#1213756).\n- scsi: lpfc: Fix lpfc_name struct packing (bsc#1213756).\n- scsi: lpfc: Make fabric zone discovery more robust when handling unsolicited LOGO (bsc#1213756).\n- scsi: lpfc: Pull out fw diagnostic dump log message from driver's trace buffer (bsc#1213756).\n- scsi: lpfc: Qualify ndlp discovery state when processing RSCN (bsc#1213756).\n- scsi: lpfc: Refactor cpu affinity assignment paths (bsc#1213756).\n- scsi: lpfc: Remove extra ndlp kref decrement in FLOGI cmpl for loop topology (bsc#1213756).\n- scsi: lpfc: Replace all non-returning strlcpy() with strscpy() (bsc#1213756).\n- scsi: lpfc: Replace one-element array with flexible-array member (bsc#1213756).\n- scsi: lpfc: Revise ndlp kref handling for dev_loss_tmo_callbk and lpfc_drop_node (bsc#1213756).\n- scsi: lpfc: Set Establish Image Pair service parameter only for Target Functions (bsc#1213756).\n- scsi: lpfc: Simplify fcp_abort transport callback log message (bsc#1213756).\n- scsi: lpfc: Update lpfc version to 14.2.0.14 (bsc#1213756).\n- scsi: lpfc: Use struct_size() helper (bsc#1213756).\n- scsi: qla2xxx: Adjust IOCB resource on qpair create (bsc#1213747).\n- scsi: qla2xxx: Array index may go out of bound (bsc#1213747).\n- scsi: qla2xxx: Avoid fcport pointer dereference (bsc#1213747).\n- scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport() (bsc#1213747).\n- scsi: qla2xxx: Correct the index of array (bsc#1213747).\n- scsi: qla2xxx: Drop useless LIST_HEAD (bsc#1213747).\n- scsi: qla2xxx: Fix buffer overrun (bsc#1213747).\n- scsi: qla2xxx: Fix command flush during TMF (bsc#1213747).\n- scsi: qla2xxx: Fix deletion race condition (bsc#1213747).\n- scsi: qla2xxx: Fix end of loop test (bsc#1213747).\n- scsi: qla2xxx: Fix erroneous link up failure (bsc#1213747).\n- scsi: qla2xxx: Fix error code in qla2x00_start_sp() (bsc#1213747).\n- scsi: qla2xxx: fix inconsistent TMF timeout (bsc#1213747).\n- scsi: qla2xxx: Fix NULL pointer dereference in target mode (bsc#1213747).\n- scsi: qla2xxx: Fix potential NULL pointer dereference (bsc#1213747).\n- scsi: qla2xxx: Fix session hang in gnl (bsc#1213747).\n- scsi: qla2xxx: Fix TMF leak through (bsc#1213747).\n- scsi: qla2xxx: Limit TMF to 8 per function (bsc#1213747).\n- scsi: qla2xxx: Pointer may be dereferenced (bsc#1213747).\n- scsi: qla2xxx: Remove unused nvme_ls_waitq wait queue (bsc#1213747).\n- scsi: qla2xxx: Replace one-element array with DECLARE_FLEX_ARRAY() helper (bsc#1213747).\n- scsi: qla2xxx: Silence a static checker warning (bsc#1213747).\n- scsi: qla2xxx: Turn off noisy message log (bsc#1213747).\n- scsi: qla2xxx: Update version to 10.02.08.400-k (bsc#1213747).\n- scsi: qla2xxx: Update version to 10.02.08.500-k (bsc#1213747).\n- scsi: qla2xxx: Use vmalloc_array() and vcalloc() (bsc#1213747).\n- selftests: rtnetlink: remove netdevsim device after ipsec offload test (git-fixes).\n- serial: qcom-geni: drop bogus runtime pm state update (git-fixes).\n- serial: sifive: Fix sifive_serial_console_setup() section (git-fixes).\n- sfc: fix crash when reading stats while NIC is resetting (git-fixes).\n- sfc: fix XDP queues mode with legacy IRQ (git-fixes).\n- sfc: use budget for TX completions (git-fixes).\n- soundwire: qcom: update status correctly with mask (git-fixes).\n- staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() (git-fixes).\n- staging: r8712: Fix memory leak in _r8712_init_xmit_priv() (git-fixes).\n- SUNRPC: always free ctxt when freeing deferred request (git-fixes).\n- SUNRPC: double free xprt_ctxt while still in use (git-fixes).\n- SUNRPC: Fix trace_svc_register() call site (git-fixes).\n- SUNRPC: Fix UAF in svc_tcp_listen_data_ready() (git-fixes).\n- SUNRPC: Remove dead code in svc_tcp_release_rqst() (git-fixes).\n- SUNRPC: remove the maximum number of retries in call_bind_status (git-fixes).\n- svcrdma: Prevent page release when nothing was received (git-fixes).\n- tpm_tis: Explicitly check for error code (git-fixes).\n- tty: n_gsm: fix UAF in gsm_cleanup_mux (git-fixes).\n- tty: serial: fsl_lpuart: add earlycon for imx8ulp platform (git-fixes).\n- uaccess: Add speculation barrier to copy_from_user() (bsc#1211738 CVE-2023-0459).\n- ubifs: Add missing iput if do_tmpfile() failed in rename whiteout (git-fixes).\n- ubifs: do_rename: Fix wrong space budget when target inode's nlink > 1 (git-fixes).\n- ubifs: Error path in ubifs_remount_rw() seems to wrongly free write buffers (git-fixes).\n- ubifs: Fix 'ui->dirty' race between do_tmpfile() and writeback work (git-fixes).\n- ubifs: Fix AA deadlock when setting xattr for encrypted file (git-fixes).\n- ubifs: Fix build errors as symbol undefined (git-fixes).\n- ubifs: Fix deadlock in concurrent rename whiteout and inode writeback (git-fixes).\n- ubifs: Fix memory leak in alloc_wbufs() (git-fixes).\n- ubifs: Fix memory leak in do_rename (git-fixes).\n- ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock() (git-fixes).\n- ubifs: Fix to add refcount once page is set private (git-fixes).\n- ubifs: Fix wrong dirty space budget for dirty inode (git-fixes).\n- ubifs: Free memory for tmpfile name (git-fixes).\n- ubifs: Re-statistic cleaned znode count if commit failed (git-fixes).\n- ubifs: Rectify space amount budget for mkdir/tmpfile operations (git-fixes).\n- ubifs: Rectify space budget for ubifs_symlink() if symlink is encrypted (git-fixes).\n- ubifs: Rectify space budget for ubifs_xrename() (git-fixes).\n- ubifs: Rename whiteout atomically (git-fixes).\n- ubifs: rename_whiteout: correct old_dir size computing (git-fixes).\n- ubifs: rename_whiteout: Fix double free for whiteout_ui->data (git-fixes).\n- ubifs: Reserve one leb for each journal head while doing budget (git-fixes).\n- ubifs: setflags: Make dirtied_ino_d 8 bytes aligned (git-fixes).\n- ubifs: ubifs_writepage: Mark page dirty after writing inode failed (git-fixes).\n- usb: dwc2: platform: Improve error reporting for problems during .remove() (git-fixes).\n- usb: dwc3: do not reset device side if dwc3 was configured as host-only (git-fixes).\n- usb: dwc3: pci: skip BYT GPIO lookup table for hardwired phy (git-fixes).\n- usb: gadget: core: remove unbalanced mutex_unlock in usb_gadget_activate (git-fixes).\n- USB: serial: option: add LARA-R6 01B PIDs (git-fixes).\n- usb: typec: Iterate pds array when showing the pd list (git-fixes).\n- usb: typec: Set port->pd before adding device for typec_port (git-fixes).\n- usb: typec: Use sysfs_emit_at when concatenating the string (git-fixes).\n- usb: xhci-mtk: set the dma max_seg_size (git-fixes).\n- vhost_net: revert upend_idx only on retriable error (git-fixes).\n- vhost: support PACKED when setting-getting vring_base (git-fixes).\n- virtio_net: Fix error unwinding of XDP initialization (git-fixes).\n- virtio-net: Maintain reverse cleanup order (git-fixes).\n- wifi: ath11k: add support for suspend in power down state (bsc#1207948).\n- wifi: ath11k: handle irq enable/disable in several code path (bsc#1207948).\n- wifi: ath11k: handle thermal device registeration together with MAC (bsc#1207948).\n- wifi: ath11k: remove MHI LOOPBACK channels (bsc#1207948).\n- wifi: ray_cs: Drop useless status variable in parse_addr() (git-fixes).\n- wifi: ray_cs: Utilize strnlen() in parse_addr() (git-fixes).\n- wl3501_cs: use eth_hw_addr_set() (git-fixes).\n- x86/PVH: obtain VGA console info in Dom0 (git-fixes).\n- x86/speculation: Add Kconfig option for GDS (bsc#1206418, CVE-2022-40982).\n- x86/srso: Add IBPB on VMEXIT (bsc#1213287, CVE-2023-20569).\n- x86/srso: Tie SBPB bit setting to microcode patch detection (bsc#1213287, CVE-2023-20569).\n- xen/blkfront: Only check REQ_FUA for writes (git-fixes).\n- xen/pvcalls-back: fix double frees with pvcalls_new_active_socket() (git-fixes).\n- xfs: AIL needs asynchronous CIL forcing (bsc#1211811).\n- xfs: async CIL flushes need pending pushes to be made stable (bsc#1211811).\n- xfs: attach iclog callbacks in xlog_cil_set_ctx_write_state() (bsc#1211811).\n- xfs: CIL work is serialised, not pipelined (bsc#1211811).\n- xfs: do not run shutdown callbacks on active iclogs (bsc#1211811).\n- xfs: drop async cache flushes from CIL commits (bsc#1211811).\n- xfs: factor out log write ordering from xlog_cil_push_work() (bsc#1211811).\n- xfs: move the CIL workqueue to the CIL (bsc#1211811).\n- xfs: move xlog_commit_record to xfs_log_cil.c (bsc#1211811).\n- xfs: order CIL checkpoint start records (bsc#1211811).\n- xfs: pass a CIL context to xlog_write() (bsc#1211811).\n- xfs: rework xlog_state_do_callback() (bsc#1211811).\n- xfs: run callbacks before waking waiters in xlog_state_shutdown_callbacks (bsc#1211811).\n- xfs: separate out log shutdown callback processing (bsc#1211811).\n- xfs: wait iclog complete before tearing down AIL (bsc#1211811).\n- xfs: XLOG_STATE_IOERROR must die (bsc#1211811).\n- xhci: Fix resume issue of some ZHAOXIN hosts (git-fixes).\n- xhci: Fix TRB prefetch issue of ZHAOXIN hosts (git-fixes).\n- xhci: Show ZHAOXIN xHCI root hub speed correctly (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-3376,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-3376,openSUSE-SLE-15.5-2023-3376", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3376-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:3376-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20233376-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:3376-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html", }, { category: "self", summary: "SUSE Bug 1206418", url: "https://bugzilla.suse.com/1206418", }, { category: "self", summary: "SUSE Bug 1207129", url: "https://bugzilla.suse.com/1207129", }, { category: "self", summary: "SUSE Bug 1207948", url: "https://bugzilla.suse.com/1207948", }, { category: "self", summary: "SUSE Bug 1210627", url: "https://bugzilla.suse.com/1210627", }, { category: "self", summary: "SUSE Bug 1210780", url: "https://bugzilla.suse.com/1210780", }, { category: "self", summary: "SUSE Bug 1210825", url: "https://bugzilla.suse.com/1210825", }, { category: "self", summary: "SUSE Bug 1211131", url: "https://bugzilla.suse.com/1211131", }, { category: "self", summary: "SUSE Bug 1211738", url: "https://bugzilla.suse.com/1211738", }, { category: "self", summary: "SUSE Bug 1211811", url: "https://bugzilla.suse.com/1211811", }, { category: "self", summary: "SUSE Bug 1212445", url: "https://bugzilla.suse.com/1212445", }, { category: "self", summary: "SUSE Bug 1212502", url: "https://bugzilla.suse.com/1212502", }, { category: "self", summary: "SUSE Bug 1212604", url: "https://bugzilla.suse.com/1212604", }, { category: "self", summary: "SUSE Bug 1212766", url: "https://bugzilla.suse.com/1212766", }, { category: "self", summary: "SUSE Bug 1212901", url: "https://bugzilla.suse.com/1212901", }, { category: "self", summary: "SUSE Bug 1213167", url: "https://bugzilla.suse.com/1213167", }, { category: "self", summary: "SUSE Bug 1213272", url: "https://bugzilla.suse.com/1213272", }, { category: "self", summary: "SUSE Bug 1213287", url: "https://bugzilla.suse.com/1213287", }, { category: "self", summary: "SUSE Bug 1213304", url: "https://bugzilla.suse.com/1213304", }, { category: "self", summary: "SUSE Bug 1213417", url: "https://bugzilla.suse.com/1213417", }, { category: "self", summary: "SUSE Bug 1213578", url: "https://bugzilla.suse.com/1213578", }, { category: "self", summary: "SUSE Bug 1213585", url: "https://bugzilla.suse.com/1213585", }, { category: "self", summary: "SUSE Bug 1213586", url: "https://bugzilla.suse.com/1213586", }, { category: "self", summary: "SUSE Bug 1213588", url: "https://bugzilla.suse.com/1213588", }, { category: "self", summary: "SUSE Bug 1213601", url: "https://bugzilla.suse.com/1213601", }, { category: "self", summary: "SUSE Bug 1213620", url: "https://bugzilla.suse.com/1213620", }, { category: "self", summary: "SUSE Bug 1213632", url: "https://bugzilla.suse.com/1213632", }, { category: "self", summary: "SUSE Bug 1213653", url: "https://bugzilla.suse.com/1213653", }, { category: "self", summary: "SUSE Bug 1213713", url: "https://bugzilla.suse.com/1213713", }, { category: "self", summary: "SUSE Bug 1213715", url: "https://bugzilla.suse.com/1213715", }, { category: "self", summary: "SUSE Bug 1213747", url: "https://bugzilla.suse.com/1213747", }, { category: "self", summary: "SUSE Bug 1213756", url: "https://bugzilla.suse.com/1213756", }, { category: "self", summary: "SUSE Bug 1213759", url: "https://bugzilla.suse.com/1213759", }, { category: "self", summary: "SUSE Bug 1213777", url: "https://bugzilla.suse.com/1213777", }, { category: "self", summary: "SUSE Bug 1213810", url: "https://bugzilla.suse.com/1213810", }, { category: "self", summary: "SUSE Bug 1213812", url: "https://bugzilla.suse.com/1213812", }, { category: "self", summary: "SUSE Bug 1213856", url: "https://bugzilla.suse.com/1213856", }, { category: "self", summary: "SUSE Bug 1213857", url: "https://bugzilla.suse.com/1213857", }, { category: "self", summary: "SUSE Bug 1213863", url: "https://bugzilla.suse.com/1213863", }, { category: "self", summary: "SUSE Bug 1213867", url: "https://bugzilla.suse.com/1213867", }, { category: "self", summary: "SUSE Bug 1213870", url: "https://bugzilla.suse.com/1213870", }, { category: "self", summary: "SUSE Bug 1213871", url: "https://bugzilla.suse.com/1213871", }, { category: "self", summary: "SUSE Bug 1213872", url: "https://bugzilla.suse.com/1213872", }, { category: "self", summary: "SUSE CVE CVE-2022-40982 page", url: "https://www.suse.com/security/cve/CVE-2022-40982/", }, { category: "self", summary: "SUSE CVE CVE-2023-0459 page", url: "https://www.suse.com/security/cve/CVE-2023-0459/", }, { category: "self", summary: "SUSE CVE CVE-2023-20569 page", url: "https://www.suse.com/security/cve/CVE-2023-20569/", }, { category: "self", summary: "SUSE CVE CVE-2023-21400 page", url: "https://www.suse.com/security/cve/CVE-2023-21400/", }, { category: "self", summary: "SUSE CVE CVE-2023-2156 page", url: "https://www.suse.com/security/cve/CVE-2023-2156/", }, { category: "self", summary: "SUSE CVE CVE-2023-2166 page", url: "https://www.suse.com/security/cve/CVE-2023-2166/", }, { category: "self", summary: "SUSE CVE CVE-2023-31083 page", url: "https://www.suse.com/security/cve/CVE-2023-31083/", }, { category: "self", summary: "SUSE CVE CVE-2023-3268 page", url: "https://www.suse.com/security/cve/CVE-2023-3268/", }, { category: "self", summary: "SUSE CVE CVE-2023-3567 page", url: "https://www.suse.com/security/cve/CVE-2023-3567/", }, { category: "self", summary: "SUSE CVE CVE-2023-3609 page", url: "https://www.suse.com/security/cve/CVE-2023-3609/", }, { category: "self", summary: "SUSE CVE CVE-2023-3611 page", url: "https://www.suse.com/security/cve/CVE-2023-3611/", }, { category: "self", summary: "SUSE CVE CVE-2023-3776 page", url: "https://www.suse.com/security/cve/CVE-2023-3776/", }, { category: "self", summary: "SUSE CVE CVE-2023-38409 page", url: "https://www.suse.com/security/cve/CVE-2023-38409/", }, { category: "self", summary: "SUSE CVE CVE-2023-3863 page", url: "https://www.suse.com/security/cve/CVE-2023-3863/", }, { category: "self", summary: "SUSE CVE CVE-2023-4004 page", url: "https://www.suse.com/security/cve/CVE-2023-4004/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-08-22T15:04:29Z", generator: { date: "2023-08-22T15:04:29Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:3376-1", initial_release_date: "2023-08-22T15:04:29Z", revision_history: [ { date: "2023-08-22T15:04:29Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", product: { name: "cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", product_id: "cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", product: { name: "dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", product_id: "dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", product: { name: "gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", product_id: "gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-5.14.21-150500.33.14.1.aarch64", product: { name: "kernel-azure-5.14.21-150500.33.14.1.aarch64", product_id: "kernel-azure-5.14.21-150500.33.14.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", product: { name: "kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", product_id: "kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", product: { name: "kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", product_id: "kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", product: { name: "kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", product_id: "kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", }, }, { category: "product_version", name: "kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", product: { name: "kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", product_id: "kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", product: { name: "kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", product_id: "kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", product: { name: "kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", product_id: "kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", product: { name: "ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", product_id: "ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", product: { name: "reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", product_id: "reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-azure-5.14.21-150500.33.14.1.noarch", product: { name: "kernel-devel-azure-5.14.21-150500.33.14.1.noarch", product_id: "kernel-devel-azure-5.14.21-150500.33.14.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-5.14.21-150500.33.14.1.noarch", product: { name: "kernel-source-azure-5.14.21-150500.33.14.1.noarch", product_id: "kernel-source-azure-5.14.21-150500.33.14.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", product: { name: "cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", product_id: "cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", product: { name: "dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", product_id: "dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", product: { name: "gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", product_id: "gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-5.14.21-150500.33.14.1.x86_64", product: { name: "kernel-azure-5.14.21-150500.33.14.1.x86_64", product_id: "kernel-azure-5.14.21-150500.33.14.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", product: { name: "kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", product_id: "kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", product: { name: "kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", product_id: "kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", product: { name: "kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", product_id: "kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", product: { name: "kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", product_id: "kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", product: { name: "kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", product_id: "kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", product: { name: "kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", product_id: "kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", product: { name: "kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", product_id: "kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", product: { name: "ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", product_id: "ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", product: { name: "reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", product_id: "reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", product: { name: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:15:sp5", }, }, }, { category: "product_name", name: "openSUSE Leap 15.5", product: { name: "openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150500.33.14.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", }, product_reference: "kernel-azure-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150500.33.14.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", }, product_reference: "kernel-azure-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150500.33.14.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", }, product_reference: "kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150500.33.14.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", }, product_reference: "kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.14.21-150500.33.14.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", }, product_reference: "kernel-devel-azure-5.14.21-150500.33.14.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.14.21-150500.33.14.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", }, product_reference: "kernel-source-azure-5.14.21-150500.33.14.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150500.33.14.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", }, product_reference: "kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150500.33.14.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", }, product_reference: "kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", }, product_reference: "cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", }, product_reference: "cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", }, product_reference: "dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", }, product_reference: "dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", }, product_reference: "gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", }, product_reference: "gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150500.33.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", }, product_reference: "kernel-azure-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", }, product_reference: "kernel-azure-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150500.33.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", }, product_reference: "kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", }, product_reference: "kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-extra-5.14.21-150500.33.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", }, product_reference: "kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-extra-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", }, product_reference: "kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", }, product_reference: "kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", }, product_reference: "kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-optional-5.14.21-150500.33.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", }, product_reference: "kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-optional-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", }, product_reference: "kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", }, product_reference: "kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.14.21-150500.33.14.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", }, product_reference: "kernel-devel-azure-5.14.21-150500.33.14.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.14.21-150500.33.14.1.noarch as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", }, product_reference: "kernel-source-azure-5.14.21-150500.33.14.1.noarch", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150500.33.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", }, product_reference: "kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", }, product_reference: "kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", }, product_reference: "kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", }, product_reference: "kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", }, product_reference: "ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", }, product_reference: "ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", }, product_reference: "reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.5", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64 as component of openSUSE Leap 15.5", product_id: "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", }, product_reference: "reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.5", }, ], }, vulnerabilities: [ { cve: "CVE-2022-40982", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-40982", }, ], notes: [ { category: "general", text: "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-40982", url: "https://www.suse.com/security/cve/CVE-2022-40982", }, { category: "external", summary: "SUSE Bug 1206418 for CVE-2022-40982", url: "https://bugzilla.suse.com/1206418", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2022-40982", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "moderate", }, ], title: "CVE-2022-40982", }, { cve: "CVE-2023-0459", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-0459", }, ], notes: [ { category: "general", text: "Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the \"access_ok\" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-0459", url: "https://www.suse.com/security/cve/CVE-2023-0459", }, { category: "external", summary: "SUSE Bug 1211738 for CVE-2023-0459", url: "https://bugzilla.suse.com/1211738", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-0459", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "moderate", }, ], title: "CVE-2023-0459", }, { cve: "CVE-2023-20569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-20569", }, ], notes: [ { category: "general", text: "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-20569", url: "https://www.suse.com/security/cve/CVE-2023-20569", }, { category: "external", summary: "SUSE Bug 1213287 for CVE-2023-20569", url: "https://bugzilla.suse.com/1213287", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "moderate", }, ], title: "CVE-2023-20569", }, { cve: "CVE-2023-21400", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-21400", }, ], notes: [ { category: "general", text: "In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-21400", url: "https://www.suse.com/security/cve/CVE-2023-21400", }, { category: "external", summary: "SUSE Bug 1213272 for CVE-2023-21400", url: "https://bugzilla.suse.com/1213272", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "moderate", }, ], title: "CVE-2023-21400", }, { cve: "CVE-2023-2156", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2156", }, ], notes: [ { category: "general", text: "A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2156", url: "https://www.suse.com/security/cve/CVE-2023-2156", }, { category: "external", summary: "SUSE Bug 1211131 for CVE-2023-2156", url: "https://bugzilla.suse.com/1211131", }, { category: "external", summary: "SUSE Bug 1211395 for CVE-2023-2156", url: "https://bugzilla.suse.com/1211395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "important", }, ], title: "CVE-2023-2156", }, { cve: "CVE-2023-2166", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2166", }, ], notes: [ { category: "general", text: "A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2166", url: "https://www.suse.com/security/cve/CVE-2023-2166", }, { category: "external", summary: "SUSE Bug 1210627 for CVE-2023-2166", url: "https://bugzilla.suse.com/1210627", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "moderate", }, ], title: "CVE-2023-2166", }, { cve: "CVE-2023-31083", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-31083", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu->proto is set. A NULL pointer dereference may occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-31083", url: "https://www.suse.com/security/cve/CVE-2023-31083", }, { category: "external", summary: "SUSE Bug 1210780 for CVE-2023-31083", url: "https://bugzilla.suse.com/1210780", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "moderate", }, ], title: "CVE-2023-31083", }, { cve: "CVE-2023-3268", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3268", }, ], notes: [ { category: "general", text: "An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3268", url: "https://www.suse.com/security/cve/CVE-2023-3268", }, { category: "external", summary: "SUSE Bug 1212502 for CVE-2023-3268", url: "https://bugzilla.suse.com/1212502", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-3268", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "moderate", }, ], title: "CVE-2023-3268", }, { cve: "CVE-2023-3567", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3567", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3567", url: "https://www.suse.com/security/cve/CVE-2023-3567", }, { category: "external", summary: "SUSE Bug 1213167 for CVE-2023-3567", url: "https://bugzilla.suse.com/1213167", }, { category: "external", summary: "SUSE Bug 1213244 for CVE-2023-3567", url: "https://bugzilla.suse.com/1213244", }, { category: "external", summary: "SUSE Bug 1213842 for CVE-2023-3567", url: "https://bugzilla.suse.com/1213842", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-3567", url: "https://bugzilla.suse.com/1215674", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3567", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3567", url: "https://bugzilla.suse.com/1217531", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "important", }, ], title: "CVE-2023-3567", }, { cve: "CVE-2023-3609", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3609", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3609", url: "https://www.suse.com/security/cve/CVE-2023-3609", }, { category: "external", summary: "SUSE Bug 1213586 for CVE-2023-3609", url: "https://bugzilla.suse.com/1213586", }, { category: "external", summary: "SUSE Bug 1213587 for CVE-2023-3609", url: "https://bugzilla.suse.com/1213587", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3609", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3609", url: "https://bugzilla.suse.com/1217531", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "moderate", }, ], title: "CVE-2023-3609", }, { cve: "CVE-2023-3611", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3611", }, ], notes: [ { category: "general", text: "An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.\n\nWe recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3611", url: "https://www.suse.com/security/cve/CVE-2023-3611", }, { category: "external", summary: "SUSE Bug 1213585 for CVE-2023-3611", url: "https://bugzilla.suse.com/1213585", }, { category: "external", summary: "SUSE Bug 1223091 for CVE-2023-3611", url: "https://bugzilla.suse.com/1223091", }, { category: "external", summary: "SUSE Bug 1223973 for CVE-2023-3611", url: "https://bugzilla.suse.com/1223973", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "moderate", }, ], title: "CVE-2023-3611", }, { cve: "CVE-2023-3776", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3776", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3776", url: "https://www.suse.com/security/cve/CVE-2023-3776", }, { category: "external", summary: "SUSE Bug 1213588 for CVE-2023-3776", url: "https://bugzilla.suse.com/1213588", }, { category: "external", summary: "SUSE Bug 1215119 for CVE-2023-3776", url: "https://bugzilla.suse.com/1215119", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-3776", url: "https://bugzilla.suse.com/1215674", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3776", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3776", url: "https://bugzilla.suse.com/1217531", }, { category: "external", summary: "SUSE Bug 1221578 for CVE-2023-3776", url: "https://bugzilla.suse.com/1221578", }, { category: "external", summary: "SUSE Bug 1221598 for CVE-2023-3776", url: "https://bugzilla.suse.com/1221598", }, { category: "external", summary: "SUSE Bug 1223091 for CVE-2023-3776", url: "https://bugzilla.suse.com/1223091", }, { category: "external", summary: "SUSE Bug 1223973 for CVE-2023-3776", url: "https://bugzilla.suse.com/1223973", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "moderate", }, ], title: "CVE-2023-3776", }, { cve: "CVE-2023-38409", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-38409", }, ], notes: [ { category: "general", text: "An issue was discovered in set_con2fb_map in drivers/video/fbdev/core/fbcon.c in the Linux kernel before 6.2.12. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-38409", url: "https://www.suse.com/security/cve/CVE-2023-38409", }, { category: "external", summary: "SUSE Bug 1213417 for CVE-2023-38409", url: "https://bugzilla.suse.com/1213417", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "low", }, ], title: "CVE-2023-38409", }, { cve: "CVE-2023-3863", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3863", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC in the Linux kernel. This flaw allows a local user with special privileges to impact a kernel information leak issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3863", url: "https://www.suse.com/security/cve/CVE-2023-3863", }, { category: "external", summary: "SUSE Bug 1213601 for CVE-2023-3863", url: "https://bugzilla.suse.com/1213601", }, { category: "external", summary: "SUSE Bug 1213603 for CVE-2023-3863", url: "https://bugzilla.suse.com/1213603", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3863", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3863", url: "https://bugzilla.suse.com/1217531", }, { category: "external", summary: "SUSE Bug 1219704 for CVE-2023-3863", url: "https://bugzilla.suse.com/1219704", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "moderate", }, ], title: "CVE-2023-3863", }, { cve: "CVE-2023-4004", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4004", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4004", url: "https://www.suse.com/security/cve/CVE-2023-4004", }, { category: "external", summary: "SUSE Bug 1213812 for CVE-2023-4004", url: "https://bugzilla.suse.com/1213812", }, { category: "external", summary: "SUSE Bug 1214812 for CVE-2023-4004", url: "https://bugzilla.suse.com/1214812", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:cluster-md-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:dlm-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:gfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-extra-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-livepatch-devel-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-azure-optional-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-azure-vdso-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kernel-devel-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-source-azure-5.14.21-150500.33.14.1.noarch", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kernel-syms-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:kselftests-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:ocfs2-kmp-azure-5.14.21-150500.33.14.1.x86_64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.aarch64", "openSUSE Leap 15.5:reiserfs-kmp-azure-5.14.21-150500.33.14.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-22T15:04:29Z", details: "important", }, ], title: "CVE-2023-4004", }, ], }
suse-su-2023:3313-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-40982: Fixed transient execution attack called 'Gather Data Sampling' (bsc#1206418).\n- CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec (bsc#1211738).\n- CVE-2023-20569: Fixed side channel attack ‘Inception’ or ‘RAS Poisoning’ (bsc#1213287).\n- CVE-2023-21400: Fixed several memory corruptions due to improper locking in io_uring (bsc#1213272).\n- CVE-2023-2156: Fixed a flaw in the networking subsystem within the handling of the RPL protocol (bsc#1211131).\n- CVE-2023-2166: Fixed NULL pointer dereference in can_rcv_filter (bsc#1210627).\n- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).\n- CVE-2023-3268: Fixed an out of bounds memory access flaw in relay_file_read_start_pos in the relayfs (bsc#1212502).\n- CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c (bsc#1213167).\n- CVE-2023-3609: Fixed reference counter leak leading to overflow in net/sched (bsc#1213586).\n- CVE-2023-3611: Fixed an out-of-bounds write in net/sched sch_qfq(bsc#1213585).\n- CVE-2023-3776: Fixed improper refcount update in cls_fw leads to use-after-free (bsc#1213588).\n- CVE-2023-4004: Fixed improper element removal netfilter nft_set_pipapo (bsc#1213812).\n\nThe following non-security bugs were fixed:\n\n- afs: Fix access after dec in put functions (git-fixes).\n- afs: Fix afs_getattr() to refetch file status if callback break occurred (git-fixes).\n- afs: Fix dynamic root getattr (git-fixes).\n- afs: Fix fileserver probe RTT handling (git-fixes).\n- afs: Fix infinite loop found by xfstest generic/676 (git-fixes).\n- afs: Fix lost servers_outstanding count (git-fixes).\n- afs: Fix server->active leak in afs_put_server (git-fixes).\n- afs: Fix setting of mtime when creating a file/dir/symlink (git-fixes).\n- afs: Fix updating of i_size with dv jump from server (git-fixes).\n- afs: Fix vlserver probe RTT handling (git-fixes).\n- afs: Return -EAGAIN, not -EREMOTEIO, when a file already locked (git-fixes).\n- afs: Use refcount_t rather than atomic_t (git-fixes).\n- afs: Use the operation issue time instead of the reply time for callbacks (git-fixes).\n- afs: adjust ack interpretation to try and cope with nat (git-fixes).\n- alsa: emu10k1: roll up loops in dsp setup code for audigy (git-fixes).\n- alsa: hda/realtek: support asus g713pv laptop (git-fixes).\n- alsa: hda/relatek: enable mute led on hp 250 g8 (git-fixes).\n- alsa: usb-audio: add quirk for microsoft modern wireless headset (bsc#1207129).\n- alsa: usb-audio: update for native dsd support quirks (git-fixes).\n- asoc: atmel: fix the 8k sample parameter in i2sc master (git-fixes).\n- asoc: codecs: es8316: fix dmic config (git-fixes).\n- asoc: da7219: check for failure reading aad irq events (git-fixes).\n- asoc: da7219: flush pending aad irq when suspending (git-fixes).\n- asoc: fsl_sai: disable bit clock with transmitter (git-fixes).\n- asoc: fsl_spdif: silence output on stop (git-fixes).\n- asoc: rt5682-sdw: fix for jd event handling in clockstop mode0 (git-fixes).\n- asoc: rt711-sdca: fix for jd event handling in clockstop mode0 (git-fixes).\n- asoc: rt711: fix for jd event handling in clockstop mode0 (git-fixes).\n- asoc: wm8904: fill the cache for wm8904_adc_test_0 register (git-fixes).\n- ata: pata_ns87415: mark ns87560_tf_read static (git-fixes).\n- block, bfq: Fix division by zero error on zero wsum (bsc#1213653).\n- block: Fix a source code comment in include/uapi/linux/blkzoned.h (git-fixes).\n- can: gs_usb: gs_can_close(): add missing set of CAN state to CAN_STATE_STOPPED (git-fixes).\n- ceph: do not let check_caps skip sending responses for revoke msgs (bsc#1213856).\n- coda: Avoid partial allocation of sig_inputArgs (git-fixes).\n- dlm: fix missing lkb refcount handling (git-fixes).\n- dlm: fix plock invalid read (git-fixes).\n- documentation: devices.txt: reconcile serial/ucc_uart minor numers (git-fixes).\n- drm/amd/display: Disable MPC split by default on special asic (git-fixes).\n- drm/amd/display: Keep PHY active for DP displays on DCN31 (git-fixes).\n- drm/client: Fix memory leak in drm_client_modeset_probe (git-fixes).\n- drm/msm/adreno: Fix snapshot BINDLESS_DATA size (git-fixes).\n- drm/msm/dpu: drop enum dpu_core_perf_data_bus_id (git-fixes).\n- drm/msm: Fix IS_ERR_OR_NULL() vs NULL check in a5xx_submit_in_rb() (git-fixes).\n- drm/radeon: Fix integer overflow in radeon_cs_parser_init (git-fixes).\n- file: always lock position for FMODE_ATOMIC_POS (bsc#1213759).\n- fs: dlm: add midcomms init/start functions (git-fixes).\n- fs: dlm: do not set stop rx flag after node reset (git-fixes).\n- fs: dlm: filter user dlm messages for kernel locks (git-fixes).\n- fs: dlm: fix log of lowcomms vs midcomms (git-fixes).\n- fs: dlm: fix race between test_bit() and queue_work() (git-fixes).\n- fs: dlm: fix race in lowcomms (git-fixes).\n- fs: dlm: handle -EBUSY first in lock arg validation (git-fixes).\n- fs: dlm: move sending fin message into state change handling (git-fixes).\n- fs: dlm: retry accept() until -EAGAIN or error returns (git-fixes).\n- fs: dlm: return positive pid value for F_GETLK (git-fixes).\n- fs: dlm: start midcomms before scand (git-fixes).\n- fs: hfsplus: remove WARN_ON() from hfsplus_cat_{read,write}_inode() (git-fixes).\n- fs: jfs: Fix UBSAN: array-index-out-of-bounds in dbAllocDmapLev (git-fixes).\n- fs: jfs: check for read-only mounted filesystem in txbegin (git-fixes).\n- fs: jfs: fix null-ptr-deref read in txbegin (git-fixes).\n- gve: Set default duplex configuration to full (git-fixes).\n- gve: unify driver name usage (git-fixes).\n- hwmon: (k10temp) Enable AMD3255 Proc to show negative temperature (git-fixes).\n- hwmon: (nct7802) Fix for temp6 (PECI1) processed even if PECI1 disabled (git-fixes).\n- iavf: Fix out-of-bounds when setting channels on remove (git-fixes).\n- iavf: Fix use-after-free in free_netdev (git-fixes).\n- iavf: use internal state to free traffic IRQs (git-fixes).\n- igc: Check if hardware TX timestamping is enabled earlier (git-fixes).\n- igc: Enable and fix RX hash usage by netstack (git-fixes).\n- igc: Fix Kernel Panic during ndo_tx_timeout callback (git-fixes).\n- igc: Fix inserting of empty frame for launchtime (git-fixes).\n- igc: Fix launchtime before start of cycle (git-fixes).\n- igc: Fix race condition in PTP tx code (git-fixes).\n- igc: Handle PPS start time programming for past time values (git-fixes).\n- igc: Prevent garbled TX queue with XDP ZEROCOPY (git-fixes).\n- igc: Remove delay during TX ring configuration (git-fixes).\n- igc: Work around HW bug causing missing timestamps (git-fixes).\n- igc: set TP bit in 'supported' and 'advertising' fields of ethtool_link_ksettings (git-fixes).\n- input: i8042 - add clevo pcx0dx to i8042 quirk table (git-fixes).\n- input: iqs269a - do not poll during ati (git-fixes).\n- input: iqs269a - do not poll during suspend or resume (git-fixes).\n- jffs2: GC deadlock reading a page that is used in jffs2_write_begin() (git-fixes).\n- jffs2: fix memory leak in jffs2_do_fill_super (git-fixes).\n- jffs2: fix memory leak in jffs2_do_mount_fs (git-fixes).\n- jffs2: fix memory leak in jffs2_scan_medium (git-fixes).\n- jffs2: fix use-after-free in jffs2_clear_xattr_subsystem (git-fixes).\n- jffs2: reduce stack usage in jffs2_build_xattr_subsystem() (git-fixes).\n- jfs: jfs_dmap: Validate db_l2nbperpage while mounting (git-fixes).\n- kvm: arm64: do not read a hw interrupt pending state in user context (git-fixes)\n- kvm: arm64: warn if accessing timer pending state outside of vcpu (bsc#1213620)\n- kvm: do not null dereference ops->destroy (git-fixes)\n- kvm: downgrade two bug_ons to warn_on_once (git-fixes)\n- kvm: initialize debugfs_dentry when a vm is created to avoid null (git-fixes)\n- kvm: s390: pv: fix index value of replaced asce (git-fixes bsc#1213867).\n- kvm: vmx: inject #gp on encls if vcpu has paging disabled (cr0.pg==0) (git-fixes).\n- kvm: vmx: inject #gp, not #ud, if sgx2 encls leafs are unsupported (git-fixes).\n- kvm: vmx: restore vmx_vmexit alignment (git-fixes).\n- kvm: x86: account fastpath-only vm-exits in vcpu stats (git-fixes).\n- libceph: harden msgr2.1 frame segment length checks (bsc#1213857).\n- media: staging: atomisp: select V4L2_FWNODE (git-fixes).\n- net/sched: sch_qfq: refactor parsing of netlink parameters (bsc#1213585).\n- net/sched: sch_qfq: reintroduce lmax bound check for MTU (bsc#1213585).\n- net: ena: fix shift-out-of-bounds in exponential backoff (git-fixes).\n- net: mana: Batch ringing RX queue doorbell on receiving packets (bsc#1212901).\n- net: mana: Use the correct WQE count for ringing RQ doorbell (bsc#1212901).\n- net: phy: marvell10g: fix 88x3310 power up (git-fixes).\n- nfsd: add encoding of op_recall flag for write delegation (git-fixes).\n- nfsd: fix double fget() bug in __write_ports_addfd() (git-fixes).\n- nfsd: fix sparse warning (git-fixes).\n- nfsd: remove open coding of string copy (git-fixes).\n- nfsv4.1: always send a reclaim_complete after establishing lease (git-fixes).\n- nfsv4.1: freeze the session table upon receiving nfs4err_badsession (git-fixes).\n- nvme-pci: fix DMA direction of unmapping integrity data (git-fixes).\n- nvme-pci: remove nvme_queue from nvme_iod (git-fixes).\n- octeontx-af: fix hardware timestamp configuration (git-fixes).\n- octeontx2-af: Move validation of ptp pointer before its usage (git-fixes).\n- octeontx2-pf: Add additional check for MCAM rules (git-fixes).\n- phy: hisilicon: Fix an out of bounds check in hisi_inno_phy_probe() (git-fixes).\n- pinctrl: amd: Do not show `Invalid config param` errors (git-fixes).\n- pinctrl: amd: Use amd_pinconf_set() for all config options (git-fixes).\n- platform/x86: msi-laptop: Fix rfkill out-of-sync on MSI Wind U100 (git-fixes).\n- rdma/bnxt_re: fix hang during driver unload (git-fixes)\n- rdma/bnxt_re: prevent handling any completions after qp destroy (git-fixes)\n- rdma/core: update cma destination address on rdma_resolve_addr (git-fixes)\n- rdma/irdma: add missing read barriers (git-fixes)\n- rdma/irdma: fix data race on cqp completion stats (git-fixes)\n- rdma/irdma: fix data race on cqp request done (git-fixes)\n- rdma/irdma: fix op_type reporting in cqes (git-fixes)\n- rdma/irdma: report correct wc error (git-fixes)\n- rdma/mlx4: make check for invalid flags stricter (git-fixes)\n- rdma/mthca: fix crash when polling cq for shared qps (git-fixes)\n- regmap: Account for register length in SMBus I/O limits (git-fixes).\n- regmap: Drop initial version of maximum transfer length fixes (git-fixes).\n- revert 'debugfs, coccinelle: check for obsolete define_simple_attribute() usage' (git-fixes).\n- revert 'nfsv4: retry lock on old_stateid during delegation return' (git-fixes).\n- revert 'usb: dwc3: core: enable autoretry feature in the controller' (git-fixes).\n- revert 'usb: gadget: tegra-xudc: fix error check in tegra_xudc_powerdomain_init()' (git-fixes).\n- revert 'usb: xhci: tegra: fix error check' (git-fixes).\n- revert 'xhci: add quirk for host controllers that do not update endpoint dcs' (git-fixes).\n- rxrpc, afs: Fix selection of abort codes (git-fixes).\n- s390/bpf: Add expoline to tail calls (git-fixes bsc#1213870).\n- s390/dasd: fix hanging device after quiesce/resume (git-fixes bsc#1213810).\n- s390/decompressor: specify __decompress() buf len to avoid overflow (git-fixes bsc#1213863).\n- s390/ipl: add missing intersection check to ipl_report handling (git-fixes bsc#1213871).\n- s390/qeth: Fix vipa deletion (git-fixes bsc#1213713).\n- s390/vmem: fix empty page tables cleanup under KASAN (git-fixes bsc#1213715).\n- s390: introduce nospec_uses_trampoline() (git-fixes bsc#1213870).\n- scftorture: Count reschedule IPIs (git-fixes).\n- scsi: lpfc: Abort outstanding ELS cmds when mailbox timeout error is detected (bsc#1213756).\n- scsi: lpfc: Avoid -Wstringop-overflow warning (bsc#1213756).\n- scsi: lpfc: Clean up SLI-4 sysfs resource reporting (bsc#1213756).\n- scsi: lpfc: Copyright updates for 14.2.0.14 patches (bsc#1213756).\n- scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() (bsc#1213756).\n- scsi: lpfc: Fix incorrect big endian type assignment in bsg loopback path (bsc#1213756).\n- scsi: lpfc: Fix incorrect big endian type assignments in FDMI and VMID paths (bsc#1213756).\n- scsi: lpfc: Fix lpfc_name struct packing (bsc#1213756).\n- scsi: lpfc: Make fabric zone discovery more robust when handling unsolicited LOGO (bsc#1213756).\n- scsi: lpfc: Pull out fw diagnostic dump log message from driver's trace buffer (bsc#1213756).\n- scsi: lpfc: Qualify ndlp discovery state when processing RSCN (bsc#1213756).\n- scsi: lpfc: Refactor cpu affinity assignment paths (bsc#1213756).\n- scsi: lpfc: Remove extra ndlp kref decrement in FLOGI cmpl for loop topology (bsc#1213756).\n- scsi: lpfc: Replace all non-returning strlcpy() with strscpy() (bsc#1213756).\n- scsi: lpfc: Replace one-element array with flexible-array member (bsc#1213756).\n- scsi: lpfc: Revise ndlp kref handling for dev_loss_tmo_callbk and lpfc_drop_node (bsc#1213756).\n- scsi: lpfc: Set Establish Image Pair service parameter only for Target Functions (bsc#1213756).\n- scsi: lpfc: Simplify fcp_abort transport callback log message (bsc#1213756).\n- scsi: lpfc: Update lpfc version to 14.2.0.14 (bsc#1213756).\n- scsi: lpfc: Use struct_size() helper (bsc#1213756).\n- scsi: qla2xxx: Adjust IOCB resource on qpair create (bsc#1213747).\n- scsi: qla2xxx: Array index may go out of bound (bsc#1213747).\n- scsi: qla2xxx: Avoid fcport pointer dereference (bsc#1213747).\n- scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport() (bsc#1213747).\n- scsi: qla2xxx: Correct the index of array (bsc#1213747).\n- scsi: qla2xxx: Drop useless LIST_HEAD (bsc#1213747).\n- scsi: qla2xxx: Fix NULL pointer dereference in target mode (bsc#1213747).\n- scsi: qla2xxx: Fix TMF leak through (bsc#1213747).\n- scsi: qla2xxx: Fix buffer overrun (bsc#1213747).\n- scsi: qla2xxx: Fix command flush during TMF (bsc#1213747).\n- scsi: qla2xxx: Fix deletion race condition (bsc#1213747).\n- scsi: qla2xxx: Fix end of loop test (bsc#1213747).\n- scsi: qla2xxx: Fix erroneous link up failure (bsc#1213747).\n- scsi: qla2xxx: Fix error code in qla2x00_start_sp() (bsc#1213747).\n- scsi: qla2xxx: Fix potential NULL pointer dereference (bsc#1213747).\n- scsi: qla2xxx: Fix session hang in gnl (bsc#1213747).\n- scsi: qla2xxx: Limit TMF to 8 per function (bsc#1213747).\n- scsi: qla2xxx: Pointer may be dereferenced (bsc#1213747).\n- scsi: qla2xxx: Remove unused nvme_ls_waitq wait queue (bsc#1213747).\n- scsi: qla2xxx: Replace one-element array with DECLARE_FLEX_ARRAY() helper (bsc#1213747).\n- scsi: qla2xxx: Silence a static checker warning (bsc#1213747).\n- scsi: qla2xxx: Turn off noisy message log (bsc#1213747).\n- scsi: qla2xxx: Update version to 10.02.08.400-k (bsc#1213747).\n- scsi: qla2xxx: Update version to 10.02.08.500-k (bsc#1213747).\n- scsi: qla2xxx: Use vmalloc_array() and vcalloc() (bsc#1213747).\n- scsi: qla2xxx: fix inconsistent TMF timeout (bsc#1213747).\n- serial: qcom-geni: drop bogus runtime pm state update (git-fixes).\n- serial: sifive: Fix sifive_serial_console_setup() section (git-fixes).\n- soundwire: qcom: update status correctly with mask (git-fixes).\n- staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() (git-fixes).\n- staging: r8712: Fix memory leak in _r8712_init_xmit_priv() (git-fixes).\n- sunrpc: always free ctxt when freeing deferred request (git-fixes).\n- sunrpc: double free xprt_ctxt while still in use (git-fixes).\n- sunrpc: fix trace_svc_register() call site (git-fixes).\n- sunrpc: fix uaf in svc_tcp_listen_data_ready() (git-fixes).\n- sunrpc: remove dead code in svc_tcp_release_rqst() (git-fixes).\n- sunrpc: remove the maximum number of retries in call_bind_status (git-fixes).\n- svcrdma: Prevent page release when nothing was received (git-fixes).\n- tpm_tis: Explicitly check for error code (git-fixes).\n- tty: n_gsm: fix UAF in gsm_cleanup_mux (git-fixes).\n- ubifs: Add missing iput if do_tmpfile() failed in rename whiteout (git-fixes).\n- ubifs: Error path in ubifs_remount_rw() seems to wrongly free write buffers (git-fixes).\n- ubifs: Fix 'ui->dirty' race between do_tmpfile() and writeback work (git-fixes).\n- ubifs: Fix AA deadlock when setting xattr for encrypted file (git-fixes).\n- ubifs: Fix build errors as symbol undefined (git-fixes).\n- ubifs: Fix deadlock in concurrent rename whiteout and inode writeback (git-fixes).\n- ubifs: Fix memory leak in alloc_wbufs() (git-fixes).\n- ubifs: Fix memory leak in do_rename (git-fixes).\n- ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock() (git-fixes).\n- ubifs: Fix to add refcount once page is set private (git-fixes).\n- ubifs: Fix wrong dirty space budget for dirty inode (git-fixes).\n- ubifs: Free memory for tmpfile name (git-fixes).\n- ubifs: Rectify space amount budget for mkdir/tmpfile operations (git-fixes).\n- ubifs: Rectify space budget for ubifs_symlink() if symlink is encrypted (git-fixes).\n- ubifs: Rectify space budget for ubifs_xrename() (git-fixes).\n- ubifs: Rename whiteout atomically (git-fixes).\n- ubifs: Reserve one leb for each journal head while doing budget (git-fixes).\n- ubifs: do_rename: Fix wrong space budget when target inode's nlink > 1 (git-fixes).\n- ubifs: rename_whiteout: Fix double free for whiteout_ui->data (git-fixes).\n- ubifs: rename_whiteout: correct old_dir size computing (git-fixes).\n- ubifs: setflags: Make dirtied_ino_d 8 bytes aligned (git-fixes).\n- ubifs: ubifs_writepage: Mark page dirty after writing inode failed (git-fixes).\n- usb: dwc3: do not reset device side if dwc3 was configured as host-only (git-fixes).\n- usb: dwc3: pci: skip BYT GPIO lookup table for hardwired phy (git-fixes).\n- usb: gadget: core: remove unbalanced mutex_unlock in usb_gadget_activate (git-fixes).\n- usb: xhci-mtk: set the dma max_seg_size (git-fixes).\n- vhost: support PACKED when setting-getting vring_base (git-fixes).\n- vhost_net: revert upend_idx only on retriable error (git-fixes).\n- virtio-net: Maintain reverse cleanup order (git-fixes).\n- virtio_net: Fix error unwinding of XDP initialization (git-fixes).\n- x86/PVH: obtain VGA console info in Dom0 (git-fixes).\n- xen/blkfront: Only check REQ_FUA for writes (git-fixes).\n- xen/pvcalls-back: fix double frees with pvcalls_new_active_socket() (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2023-3313,SUSE-SLE-Micro-5.3-2023-3313,SUSE-SLE-Micro-5.4-2023-3313,SUSE-SLE-Module-Basesystem-15-SP4-2023-3313,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3313,SUSE-SLE-Module-Legacy-15-SP4-2023-3313,SUSE-SLE-Module-Live-Patching-15-SP4-2023-3313,SUSE-SLE-Product-HA-15-SP4-2023-3313,SUSE-SLE-Product-WE-15-SP4-2023-3313,openSUSE-Leap-Micro-5.3-2023-3313,openSUSE-Leap-Micro-5.4-2023-3313,openSUSE-SLE-15.4-2023-3313", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3313-1.json", }, { category: "self", summary: "URL for SUSE-SU-2023:3313-1", url: "https://www.suse.com/support/update/announcement/2023/suse-su-20233313-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2023:3313-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html", }, { category: "self", summary: "SUSE Bug 1206418", url: "https://bugzilla.suse.com/1206418", }, { category: "self", summary: "SUSE Bug 1207129", url: "https://bugzilla.suse.com/1207129", }, { category: "self", summary: "SUSE Bug 1210627", url: "https://bugzilla.suse.com/1210627", }, { category: "self", summary: "SUSE Bug 1210780", url: "https://bugzilla.suse.com/1210780", }, { category: "self", summary: "SUSE Bug 1211131", url: "https://bugzilla.suse.com/1211131", }, { category: "self", summary: "SUSE Bug 1211738", url: "https://bugzilla.suse.com/1211738", }, { category: "self", summary: "SUSE Bug 1212502", url: "https://bugzilla.suse.com/1212502", }, { category: "self", summary: "SUSE Bug 1212604", url: "https://bugzilla.suse.com/1212604", }, { category: "self", summary: "SUSE Bug 1212901", url: "https://bugzilla.suse.com/1212901", }, { category: "self", summary: "SUSE Bug 1213167", url: "https://bugzilla.suse.com/1213167", }, { category: "self", summary: "SUSE Bug 1213272", url: "https://bugzilla.suse.com/1213272", }, { category: "self", summary: "SUSE Bug 1213287", url: "https://bugzilla.suse.com/1213287", }, { category: "self", summary: "SUSE Bug 1213304", url: "https://bugzilla.suse.com/1213304", }, { category: "self", summary: "SUSE Bug 1213585", url: "https://bugzilla.suse.com/1213585", }, { category: "self", summary: "SUSE Bug 1213586", url: "https://bugzilla.suse.com/1213586", }, { category: "self", summary: "SUSE Bug 1213588", url: "https://bugzilla.suse.com/1213588", }, { category: "self", summary: "SUSE Bug 1213620", url: "https://bugzilla.suse.com/1213620", }, { category: "self", summary: "SUSE Bug 1213653", url: "https://bugzilla.suse.com/1213653", }, { category: "self", summary: "SUSE Bug 1213713", url: "https://bugzilla.suse.com/1213713", }, { category: "self", summary: "SUSE Bug 1213715", url: "https://bugzilla.suse.com/1213715", }, { category: "self", summary: "SUSE Bug 1213747", url: "https://bugzilla.suse.com/1213747", }, { category: "self", summary: "SUSE Bug 1213756", url: "https://bugzilla.suse.com/1213756", }, { category: "self", summary: "SUSE Bug 1213759", url: "https://bugzilla.suse.com/1213759", }, { category: "self", summary: "SUSE Bug 1213777", url: "https://bugzilla.suse.com/1213777", }, { category: "self", summary: "SUSE Bug 1213810", url: "https://bugzilla.suse.com/1213810", }, { category: "self", summary: "SUSE Bug 1213812", url: "https://bugzilla.suse.com/1213812", }, { category: "self", summary: "SUSE Bug 1213842", url: "https://bugzilla.suse.com/1213842", }, { category: "self", summary: "SUSE Bug 1213856", url: "https://bugzilla.suse.com/1213856", }, { category: "self", summary: "SUSE Bug 1213857", url: "https://bugzilla.suse.com/1213857", }, { category: "self", summary: "SUSE Bug 1213863", url: "https://bugzilla.suse.com/1213863", }, { category: "self", summary: "SUSE Bug 1213867", url: "https://bugzilla.suse.com/1213867", }, { category: "self", summary: "SUSE Bug 1213870", url: "https://bugzilla.suse.com/1213870", }, { category: "self", summary: "SUSE Bug 1213871", url: "https://bugzilla.suse.com/1213871", }, { category: "self", summary: "SUSE CVE CVE-2022-40982 page", url: "https://www.suse.com/security/cve/CVE-2022-40982/", }, { category: "self", summary: "SUSE CVE CVE-2023-0459 page", url: "https://www.suse.com/security/cve/CVE-2023-0459/", }, { category: "self", summary: "SUSE CVE CVE-2023-20569 page", url: "https://www.suse.com/security/cve/CVE-2023-20569/", }, { category: "self", summary: "SUSE CVE CVE-2023-21400 page", url: "https://www.suse.com/security/cve/CVE-2023-21400/", }, { category: "self", summary: "SUSE CVE CVE-2023-2156 page", url: "https://www.suse.com/security/cve/CVE-2023-2156/", }, { category: "self", summary: "SUSE CVE CVE-2023-2166 page", url: "https://www.suse.com/security/cve/CVE-2023-2166/", }, { category: "self", summary: "SUSE CVE CVE-2023-31083 page", url: "https://www.suse.com/security/cve/CVE-2023-31083/", }, { category: "self", summary: "SUSE CVE CVE-2023-3268 page", url: "https://www.suse.com/security/cve/CVE-2023-3268/", }, { category: "self", summary: "SUSE CVE CVE-2023-3567 page", url: "https://www.suse.com/security/cve/CVE-2023-3567/", }, { category: "self", summary: "SUSE CVE CVE-2023-3609 page", url: "https://www.suse.com/security/cve/CVE-2023-3609/", }, { category: "self", summary: "SUSE CVE CVE-2023-3611 page", url: "https://www.suse.com/security/cve/CVE-2023-3611/", }, { category: "self", summary: "SUSE CVE CVE-2023-3776 page", url: "https://www.suse.com/security/cve/CVE-2023-3776/", }, { category: "self", summary: "SUSE CVE CVE-2023-4004 page", url: "https://www.suse.com/security/cve/CVE-2023-4004/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2023-08-14T15:35:23Z", generator: { date: "2023-08-14T15:35:23Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2023:3313-1", initial_release_date: "2023-08-14T15:35:23Z", revision_history: [ { date: "2023-08-14T15:35:23Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", product: { name: "cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", product_id: "cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", product: { name: "cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", product_id: "cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", product: { name: "dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", product_id: "dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", product: { name: "dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", product_id: "dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "dtb-allwinner-5.14.21-150400.24.81.1.aarch64", product: { name: "dtb-allwinner-5.14.21-150400.24.81.1.aarch64", product_id: "dtb-allwinner-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "dtb-altera-5.14.21-150400.24.81.1.aarch64", product: { name: "dtb-altera-5.14.21-150400.24.81.1.aarch64", product_id: "dtb-altera-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "dtb-amazon-5.14.21-150400.24.81.1.aarch64", product: { name: "dtb-amazon-5.14.21-150400.24.81.1.aarch64", product_id: "dtb-amazon-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "dtb-amd-5.14.21-150400.24.81.1.aarch64", product: { name: "dtb-amd-5.14.21-150400.24.81.1.aarch64", product_id: "dtb-amd-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "dtb-amlogic-5.14.21-150400.24.81.1.aarch64", product: { name: "dtb-amlogic-5.14.21-150400.24.81.1.aarch64", product_id: "dtb-amlogic-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "dtb-apm-5.14.21-150400.24.81.1.aarch64", product: { name: "dtb-apm-5.14.21-150400.24.81.1.aarch64", product_id: "dtb-apm-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "dtb-apple-5.14.21-150400.24.81.1.aarch64", product: { name: "dtb-apple-5.14.21-150400.24.81.1.aarch64", product_id: "dtb-apple-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "dtb-arm-5.14.21-150400.24.81.1.aarch64", product: { name: "dtb-arm-5.14.21-150400.24.81.1.aarch64", product_id: "dtb-arm-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "dtb-broadcom-5.14.21-150400.24.81.1.aarch64", product: { name: "dtb-broadcom-5.14.21-150400.24.81.1.aarch64", product_id: "dtb-broadcom-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "dtb-cavium-5.14.21-150400.24.81.1.aarch64", product: { name: "dtb-cavium-5.14.21-150400.24.81.1.aarch64", product_id: "dtb-cavium-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "dtb-exynos-5.14.21-150400.24.81.1.aarch64", product: { name: "dtb-exynos-5.14.21-150400.24.81.1.aarch64", product_id: "dtb-exynos-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "dtb-freescale-5.14.21-150400.24.81.1.aarch64", product: { name: "dtb-freescale-5.14.21-150400.24.81.1.aarch64", product_id: "dtb-freescale-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", product: { name: "dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", product_id: "dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "dtb-lg-5.14.21-150400.24.81.1.aarch64", product: { name: "dtb-lg-5.14.21-150400.24.81.1.aarch64", product_id: "dtb-lg-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "dtb-marvell-5.14.21-150400.24.81.1.aarch64", product: { name: "dtb-marvell-5.14.21-150400.24.81.1.aarch64", product_id: "dtb-marvell-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "dtb-mediatek-5.14.21-150400.24.81.1.aarch64", product: { name: "dtb-mediatek-5.14.21-150400.24.81.1.aarch64", product_id: "dtb-mediatek-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "dtb-nvidia-5.14.21-150400.24.81.1.aarch64", product: { name: "dtb-nvidia-5.14.21-150400.24.81.1.aarch64", product_id: "dtb-nvidia-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "dtb-qcom-5.14.21-150400.24.81.1.aarch64", product: { name: "dtb-qcom-5.14.21-150400.24.81.1.aarch64", product_id: "dtb-qcom-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "dtb-renesas-5.14.21-150400.24.81.1.aarch64", product: { name: "dtb-renesas-5.14.21-150400.24.81.1.aarch64", product_id: "dtb-renesas-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "dtb-rockchip-5.14.21-150400.24.81.1.aarch64", product: { name: "dtb-rockchip-5.14.21-150400.24.81.1.aarch64", product_id: "dtb-rockchip-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "dtb-socionext-5.14.21-150400.24.81.1.aarch64", product: { name: "dtb-socionext-5.14.21-150400.24.81.1.aarch64", product_id: "dtb-socionext-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "dtb-sprd-5.14.21-150400.24.81.1.aarch64", product: { name: "dtb-sprd-5.14.21-150400.24.81.1.aarch64", product_id: "dtb-sprd-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "dtb-xilinx-5.14.21-150400.24.81.1.aarch64", product: { name: "dtb-xilinx-5.14.21-150400.24.81.1.aarch64", product_id: "dtb-xilinx-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", product: { name: "gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", product_id: "gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", product: { name: "gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", product_id: "gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-5.14.21-150400.24.81.1.aarch64", product: { name: "kernel-64kb-5.14.21-150400.24.81.1.aarch64", product_id: "kernel-64kb-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", product: { name: "kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", product_id: "kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", product: { name: "kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", product_id: "kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", product: { name: "kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", product_id: "kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", product: { name: "kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", product_id: "kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "kernel-default-5.14.21-150400.24.81.1.aarch64", product: { name: "kernel-default-5.14.21-150400.24.81.1.aarch64", product_id: "kernel-default-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", product: { name: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", product_id: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", product: { name: "kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", product_id: "kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150400.24.81.1.aarch64", product: { name: "kernel-default-devel-5.14.21-150400.24.81.1.aarch64", product_id: "kernel-default-devel-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150400.24.81.1.aarch64", product: { name: "kernel-default-extra-5.14.21-150400.24.81.1.aarch64", product_id: "kernel-default-extra-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", product: { name: "kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", product_id: "kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", product: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", product_id: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150400.24.81.1.aarch64", product: { name: "kernel-default-optional-5.14.21-150400.24.81.1.aarch64", product_id: "kernel-default-optional-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", product: { name: "kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", product_id: "kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", product: { name: "kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", product_id: "kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", product: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", product_id: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150400.24.81.1.aarch64", product: { name: "kernel-obs-build-5.14.21-150400.24.81.1.aarch64", product_id: "kernel-obs-build-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", product: { name: "kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", product_id: "kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150400.24.81.1.aarch64", product: { name: "kernel-syms-5.14.21-150400.24.81.1.aarch64", product_id: "kernel-syms-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", product: { name: "kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", product_id: "kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", product: { name: "kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", product_id: "kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", product: { name: "ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", product_id: "ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", product: { name: "ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", product_id: "ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", product: { name: "reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", product_id: "reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", product: { name: "reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", product_id: "reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-5.14.21-150400.24.81.1.noarch", product: { name: "kernel-devel-5.14.21-150400.24.81.1.noarch", product_id: "kernel-devel-5.14.21-150400.24.81.1.noarch", }, }, { category: "product_version", name: "kernel-docs-5.14.21-150400.24.81.1.noarch", product: { name: "kernel-docs-5.14.21-150400.24.81.1.noarch", product_id: "kernel-docs-5.14.21-150400.24.81.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-5.14.21-150400.24.81.1.noarch", product: { name: "kernel-docs-html-5.14.21-150400.24.81.1.noarch", product_id: "kernel-docs-html-5.14.21-150400.24.81.1.noarch", }, }, { category: "product_version", name: "kernel-macros-5.14.21-150400.24.81.1.noarch", product: { name: "kernel-macros-5.14.21-150400.24.81.1.noarch", product_id: "kernel-macros-5.14.21-150400.24.81.1.noarch", }, }, { category: "product_version", name: "kernel-source-5.14.21-150400.24.81.1.noarch", product: { name: "kernel-source-5.14.21-150400.24.81.1.noarch", product_id: "kernel-source-5.14.21-150400.24.81.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", product: { name: "kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", product_id: "kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", product: { name: "cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", product_id: "cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", product: { name: "dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", product_id: "dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", product: { name: "gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", product_id: "gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-5.14.21-150400.24.81.1.ppc64le", product: { name: "kernel-debug-5.14.21-150400.24.81.1.ppc64le", product_id: "kernel-debug-5.14.21-150400.24.81.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", product: { name: "kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", product_id: "kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", product: { name: "kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", product_id: "kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-5.14.21-150400.24.81.1.ppc64le", product: { name: "kernel-default-5.14.21-150400.24.81.1.ppc64le", product_id: "kernel-default-5.14.21-150400.24.81.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", product: { name: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", product_id: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", product: { name: "kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", product_id: "kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", product: { name: "kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", product_id: "kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", product: { name: "kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", product_id: "kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", product: { name: "kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", product_id: "kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", product: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", product_id: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", product: { name: "kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", product_id: "kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", product: { name: "kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", product_id: "kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", product: { name: "kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", product_id: "kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", product: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", product_id: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", product: { name: "kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", product_id: "kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", product: { name: "kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", product_id: "kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", product: { name: "kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", product_id: "kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150400.24.81.1.ppc64le", product: { name: "kernel-syms-5.14.21-150400.24.81.1.ppc64le", product_id: "kernel-syms-5.14.21-150400.24.81.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", product: { name: "kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", product_id: "kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", product: { name: "ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", product_id: "ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", product: { name: "reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", product_id: "reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", product: { name: "cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", product_id: "cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150400.24.81.1.s390x", product: { name: "dlm-kmp-default-5.14.21-150400.24.81.1.s390x", product_id: "dlm-kmp-default-5.14.21-150400.24.81.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", product: { name: "gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", product_id: "gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", }, }, { category: "product_version", name: "kernel-default-5.14.21-150400.24.81.1.s390x", product: { name: "kernel-default-5.14.21-150400.24.81.1.s390x", product_id: "kernel-default-5.14.21-150400.24.81.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150400.24.81.1.s390x", product: { name: "kernel-default-devel-5.14.21-150400.24.81.1.s390x", product_id: "kernel-default-devel-5.14.21-150400.24.81.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150400.24.81.1.s390x", product: { name: "kernel-default-extra-5.14.21-150400.24.81.1.s390x", product_id: "kernel-default-extra-5.14.21-150400.24.81.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", product: { name: "kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", product_id: "kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", product: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", product_id: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150400.24.81.1.s390x", product: { name: "kernel-default-optional-5.14.21-150400.24.81.1.s390x", product_id: "kernel-default-optional-5.14.21-150400.24.81.1.s390x", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", product: { name: "kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", product_id: "kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150400.24.81.1.s390x", product: { name: "kernel-obs-build-5.14.21-150400.24.81.1.s390x", product_id: "kernel-obs-build-5.14.21-150400.24.81.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150400.24.81.1.s390x", product: { name: "kernel-obs-qa-5.14.21-150400.24.81.1.s390x", product_id: "kernel-obs-qa-5.14.21-150400.24.81.1.s390x", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150400.24.81.1.s390x", product: { name: "kernel-syms-5.14.21-150400.24.81.1.s390x", product_id: "kernel-syms-5.14.21-150400.24.81.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", product: { name: "kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", product_id: "kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", product: { name: "kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", product_id: "kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", product: { name: "ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", product_id: "ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", product: { name: "reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", product_id: "reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", product: { name: "cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", product_id: "cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", product: { name: "dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", product_id: "dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", product: { name: "gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", product_id: "gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-5.14.21-150400.24.81.1.x86_64", product: { name: "kernel-debug-5.14.21-150400.24.81.1.x86_64", product_id: "kernel-debug-5.14.21-150400.24.81.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", product: { name: "kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", product_id: "kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", product: { name: "kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", product_id: "kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", }, }, { category: "product_version", name: "kernel-default-5.14.21-150400.24.81.1.x86_64", product: { name: "kernel-default-5.14.21-150400.24.81.1.x86_64", product_id: "kernel-default-5.14.21-150400.24.81.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", product: { name: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", product_id: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", product: { name: "kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", product_id: "kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-5.14.21-150400.24.81.1.x86_64", product: { name: "kernel-default-devel-5.14.21-150400.24.81.1.x86_64", product_id: "kernel-default-devel-5.14.21-150400.24.81.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-5.14.21-150400.24.81.1.x86_64", product: { name: "kernel-default-extra-5.14.21-150400.24.81.1.x86_64", product_id: "kernel-default-extra-5.14.21-150400.24.81.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", product: { name: "kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", product_id: "kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", product: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", product_id: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", }, }, { category: "product_version", name: "kernel-default-optional-5.14.21-150400.24.81.1.x86_64", product: { name: "kernel-default-optional-5.14.21-150400.24.81.1.x86_64", product_id: "kernel-default-optional-5.14.21-150400.24.81.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", product: { name: "kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", product_id: "kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", product: { name: "kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", product_id: "kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", product: { name: "kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", product_id: "kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-5.14.21-150400.24.81.1.x86_64", product: { name: "kernel-obs-build-5.14.21-150400.24.81.1.x86_64", product_id: "kernel-obs-build-5.14.21-150400.24.81.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", product: { name: "kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", product_id: "kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-5.14.21-150400.24.81.1.x86_64", product: { name: "kernel-syms-5.14.21-150400.24.81.1.x86_64", product_id: "kernel-syms-5.14.21-150400.24.81.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", product: { name: "kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", product_id: "kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", product: { name: "ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", product_id: "ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", product: { name: "reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", product_id: "reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Micro 5.3", product: { name: "SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3", product_identification_helper: { cpe: "cpe:/o:suse:sle-micro:5.3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.4", product: { name: "SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4", product_identification_helper: { cpe: "cpe:/o:suse:sle-micro:5.4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15 SP4", product: { name: "SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Legacy 15 SP4", product: { name: "SUSE Linux Enterprise Module for Legacy 15 SP4", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-legacy:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP4", product: { name: "SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15 SP4", product: { name: "SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 15 SP4", product: { name: "SUSE Linux Enterprise Workstation Extension 15 SP4", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:15:sp4", }, }, }, { category: "product_name", name: "openSUSE Leap Micro 5.3", product: { name: "openSUSE Leap Micro 5.3", product_id: "openSUSE Leap Micro 5.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap-micro:5.3", }, }, }, { category: "product_name", name: "openSUSE Leap Micro 5.4", product: { name: "openSUSE Leap Micro 5.4", product_id: "openSUSE Leap Micro 5.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap-micro:5.4", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.81.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-default-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.81.1.s390x as component of SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", }, product_reference: "kernel-default-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.81.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-default-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64 as component of SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", }, product_reference: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64 as component of SUSE Linux Enterprise Micro 5.3", product_id: "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", }, product_reference: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.81.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-default-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.81.1.s390x as component of SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", }, product_reference: "kernel-default-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.81.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-default-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64 as component of SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", }, product_reference: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64 as component of SUSE Linux Enterprise Micro 5.4", product_id: "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", }, product_reference: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.14.21-150400.24.81.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-64kb-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.81.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-default-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.81.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "kernel-default-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.81.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", }, product_reference: "kernel-default-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.81.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-default-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", }, product_reference: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", }, product_reference: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", }, product_reference: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.81.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-default-devel-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.81.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.81.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", }, product_reference: "kernel-default-devel-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.81.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-default-devel-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.14.21-150400.24.81.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", }, product_reference: "kernel-devel-5.14.21-150400.24.81.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.14.21-150400.24.81.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", }, product_reference: "kernel-macros-5.14.21-150400.24.81.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-5.14.21-150400.24.81.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", }, product_reference: "kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.14.21-150400.24.81.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", }, product_reference: "kernel-docs-5.14.21-150400.24.81.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.81.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-obs-build-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.81.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.81.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", }, product_reference: "kernel-obs-build-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.81.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-obs-build-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.14.21-150400.24.81.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", }, product_reference: "kernel-source-5.14.21-150400.24.81.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.81.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-syms-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.81.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "kernel-syms-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.81.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", }, product_reference: "kernel-syms-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.81.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-syms-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP4", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP4", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.81.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", }, product_reference: "kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", }, product_reference: "kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", }, product_reference: "kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.81.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.81.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.81.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.81.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150400.24.81.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP4", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-default-extra-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap Micro 5.3", product_id: "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-default-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.81.1.x86_64 as component of openSUSE Leap Micro 5.3", product_id: "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-default-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "openSUSE Leap Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64 as component of openSUSE Leap Micro 5.3", product_id: "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", }, product_reference: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", relates_to_product_reference: "openSUSE Leap Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64 as component of openSUSE Leap Micro 5.3", product_id: "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", }, product_reference: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", relates_to_product_reference: "openSUSE Leap Micro 5.3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap Micro 5.4", product_id: "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-default-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.81.1.s390x as component of openSUSE Leap Micro 5.4", product_id: "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", }, product_reference: "kernel-default-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "openSUSE Leap Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.81.1.x86_64 as component of openSUSE Leap Micro 5.4", product_id: "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-default-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "openSUSE Leap Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64 as component of openSUSE Leap Micro 5.4", product_id: "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", }, product_reference: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", relates_to_product_reference: "openSUSE Leap Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64 as component of openSUSE Leap Micro 5.4", product_id: "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", }, product_reference: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", relates_to_product_reference: "openSUSE Leap Micro 5.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", }, product_reference: "cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", }, product_reference: "cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.81.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.14.21-150400.24.81.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", }, product_reference: "dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-allwinner-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dtb-allwinner-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-altera-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dtb-altera-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-amazon-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dtb-amazon-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-amd-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dtb-amd-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-amlogic-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dtb-amlogic-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-apm-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dtb-apm-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-apple-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dtb-apple-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-arm-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dtb-arm-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-broadcom-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dtb-broadcom-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-cavium-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dtb-cavium-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-exynos-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dtb-exynos-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-freescale-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dtb-freescale-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-hisilicon-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-lg-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dtb-lg-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-marvell-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dtb-marvell-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-mediatek-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dtb-mediatek-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-nvidia-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dtb-nvidia-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-qcom-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dtb-qcom-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-renesas-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dtb-renesas-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-rockchip-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dtb-rockchip-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-socionext-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dtb-socionext-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-sprd-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dtb-sprd-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "dtb-xilinx-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", }, product_reference: "dtb-xilinx-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", }, product_reference: "gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.81.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", }, product_reference: "gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-64kb-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-5.14.21-150400.24.81.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "kernel-debug-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-5.14.21-150400.24.81.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-debug-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-5.14.21-150400.24.81.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-default-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.81.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "kernel-default-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.81.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", }, product_reference: "kernel-default-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.14.21-150400.24.81.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-default-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", }, product_reference: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", }, product_reference: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", }, product_reference: "kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", }, product_reference: "kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", }, product_reference: "kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", }, product_reference: "kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-default-devel-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.81.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.81.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", }, product_reference: "kernel-default-devel-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.14.21-150400.24.81.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-default-devel-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-default-extra-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150400.24.81.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150400.24.81.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", }, product_reference: "kernel-default-extra-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.14.21-150400.24.81.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-default-extra-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.81.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-default-optional-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150400.24.81.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150400.24.81.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", }, product_reference: "kernel-default-optional-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-optional-5.14.21-150400.24.81.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-default-optional-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.14.21-150400.24.81.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", }, product_reference: "kernel-devel-5.14.21-150400.24.81.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.14.21-150400.24.81.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", }, product_reference: "kernel-docs-5.14.21-150400.24.81.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-html-5.14.21-150400.24.81.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", }, product_reference: "kernel-docs-html-5.14.21-150400.24.81.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.14.21-150400.24.81.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", }, product_reference: "kernel-macros-5.14.21-150400.24.81.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-obs-build-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.81.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.81.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", }, product_reference: "kernel-obs-build-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.14.21-150400.24.81.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-obs-build-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150400.24.81.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", }, product_reference: "kernel-obs-qa-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.14.21-150400.24.81.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.14.21-150400.24.81.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", }, product_reference: "kernel-source-5.14.21-150400.24.81.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-vanilla-5.14.21-150400.24.81.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", }, product_reference: "kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kernel-syms-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.81.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "kernel-syms-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.81.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", }, product_reference: "kernel-syms-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.14.21-150400.24.81.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kernel-syms-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kernel-zfcpdump-5.14.21-150400.24.81.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", }, product_reference: "kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", }, product_reference: "kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150400.24.81.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", }, product_reference: "kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", }, product_reference: "kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", }, product_reference: "ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", }, product_reference: "ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", }, product_reference: "reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2022-40982", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-40982", }, ], notes: [ { category: "general", text: "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-40982", url: "https://www.suse.com/security/cve/CVE-2022-40982", }, { category: "external", summary: "SUSE Bug 1206418 for CVE-2022-40982", url: "https://bugzilla.suse.com/1206418", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2022-40982", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T15:35:23Z", details: "moderate", }, ], title: "CVE-2022-40982", }, { cve: "CVE-2023-0459", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-0459", }, ], notes: [ { category: "general", text: "Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the \"access_ok\" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-0459", url: "https://www.suse.com/security/cve/CVE-2023-0459", }, { category: "external", summary: "SUSE Bug 1211738 for CVE-2023-0459", url: "https://bugzilla.suse.com/1211738", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-0459", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T15:35:23Z", details: "moderate", }, ], title: "CVE-2023-0459", }, { cve: "CVE-2023-20569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-20569", }, ], notes: [ { category: "general", text: "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-20569", url: "https://www.suse.com/security/cve/CVE-2023-20569", }, { category: "external", summary: "SUSE Bug 1213287 for CVE-2023-20569", url: "https://bugzilla.suse.com/1213287", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T15:35:23Z", details: "moderate", }, ], title: "CVE-2023-20569", }, { cve: "CVE-2023-21400", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-21400", }, ], notes: [ { category: "general", text: "In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-21400", url: "https://www.suse.com/security/cve/CVE-2023-21400", }, { category: "external", summary: "SUSE Bug 1213272 for CVE-2023-21400", url: "https://bugzilla.suse.com/1213272", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T15:35:23Z", details: "moderate", }, ], title: "CVE-2023-21400", }, { cve: "CVE-2023-2156", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2156", }, ], notes: [ { category: "general", text: "A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2156", url: "https://www.suse.com/security/cve/CVE-2023-2156", }, { category: "external", summary: "SUSE Bug 1211131 for CVE-2023-2156", url: "https://bugzilla.suse.com/1211131", }, { category: "external", summary: "SUSE Bug 1211395 for CVE-2023-2156", url: "https://bugzilla.suse.com/1211395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T15:35:23Z", details: "important", }, ], title: "CVE-2023-2156", }, { cve: "CVE-2023-2166", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-2166", }, ], notes: [ { category: "general", text: "A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-2166", url: "https://www.suse.com/security/cve/CVE-2023-2166", }, { category: "external", summary: "SUSE Bug 1210627 for CVE-2023-2166", url: "https://bugzilla.suse.com/1210627", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T15:35:23Z", details: "moderate", }, ], title: "CVE-2023-2166", }, { cve: "CVE-2023-31083", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-31083", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu->proto is set. A NULL pointer dereference may occur.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-31083", url: "https://www.suse.com/security/cve/CVE-2023-31083", }, { category: "external", summary: "SUSE Bug 1210780 for CVE-2023-31083", url: "https://bugzilla.suse.com/1210780", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T15:35:23Z", details: "moderate", }, ], title: "CVE-2023-31083", }, { cve: "CVE-2023-3268", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3268", }, ], notes: [ { category: "general", text: "An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3268", url: "https://www.suse.com/security/cve/CVE-2023-3268", }, { category: "external", summary: "SUSE Bug 1212502 for CVE-2023-3268", url: "https://bugzilla.suse.com/1212502", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-3268", url: "https://bugzilla.suse.com/1215674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T15:35:23Z", details: "moderate", }, ], title: "CVE-2023-3268", }, { cve: "CVE-2023-3567", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3567", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3567", url: "https://www.suse.com/security/cve/CVE-2023-3567", }, { category: "external", summary: "SUSE Bug 1213167 for CVE-2023-3567", url: "https://bugzilla.suse.com/1213167", }, { category: "external", summary: "SUSE Bug 1213244 for CVE-2023-3567", url: "https://bugzilla.suse.com/1213244", }, { category: "external", summary: "SUSE Bug 1213842 for CVE-2023-3567", url: "https://bugzilla.suse.com/1213842", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-3567", url: "https://bugzilla.suse.com/1215674", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3567", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3567", url: "https://bugzilla.suse.com/1217531", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T15:35:23Z", details: "important", }, ], title: "CVE-2023-3567", }, { cve: "CVE-2023-3609", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3609", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3609", url: "https://www.suse.com/security/cve/CVE-2023-3609", }, { category: "external", summary: "SUSE Bug 1213586 for CVE-2023-3609", url: "https://bugzilla.suse.com/1213586", }, { category: "external", summary: "SUSE Bug 1213587 for CVE-2023-3609", url: "https://bugzilla.suse.com/1213587", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3609", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3609", url: "https://bugzilla.suse.com/1217531", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T15:35:23Z", details: "moderate", }, ], title: "CVE-2023-3609", }, { cve: "CVE-2023-3611", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3611", }, ], notes: [ { category: "general", text: "An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.\n\nWe recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3611", url: "https://www.suse.com/security/cve/CVE-2023-3611", }, { category: "external", summary: "SUSE Bug 1213585 for CVE-2023-3611", url: "https://bugzilla.suse.com/1213585", }, { category: "external", summary: "SUSE Bug 1223091 for CVE-2023-3611", url: "https://bugzilla.suse.com/1223091", }, { category: "external", summary: "SUSE Bug 1223973 for CVE-2023-3611", url: "https://bugzilla.suse.com/1223973", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T15:35:23Z", details: "moderate", }, ], title: "CVE-2023-3611", }, { cve: "CVE-2023-3776", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-3776", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-3776", url: "https://www.suse.com/security/cve/CVE-2023-3776", }, { category: "external", summary: "SUSE Bug 1213588 for CVE-2023-3776", url: "https://bugzilla.suse.com/1213588", }, { category: "external", summary: "SUSE Bug 1215119 for CVE-2023-3776", url: "https://bugzilla.suse.com/1215119", }, { category: "external", summary: "SUSE Bug 1215674 for CVE-2023-3776", url: "https://bugzilla.suse.com/1215674", }, { category: "external", summary: "SUSE Bug 1217444 for CVE-2023-3776", url: "https://bugzilla.suse.com/1217444", }, { category: "external", summary: "SUSE Bug 1217531 for CVE-2023-3776", url: "https://bugzilla.suse.com/1217531", }, { category: "external", summary: "SUSE Bug 1221578 for CVE-2023-3776", url: "https://bugzilla.suse.com/1221578", }, { category: "external", summary: "SUSE Bug 1221598 for CVE-2023-3776", url: "https://bugzilla.suse.com/1221598", }, { category: "external", summary: "SUSE Bug 1223091 for CVE-2023-3776", url: "https://bugzilla.suse.com/1223091", }, { category: "external", summary: "SUSE Bug 1223973 for CVE-2023-3776", url: "https://bugzilla.suse.com/1223973", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T15:35:23Z", details: "moderate", }, ], title: "CVE-2023-3776", }, { cve: "CVE-2023-4004", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-4004", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-4004", url: "https://www.suse.com/security/cve/CVE-2023-4004", }, { category: "external", summary: "SUSE Bug 1213812 for CVE-2023-4004", url: "https://bugzilla.suse.com/1213812", }, { category: "external", summary: "SUSE Bug 1214812 for CVE-2023-4004", url: "https://bugzilla.suse.com/1214812", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_81-default-1-150400.9.3.3.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.81.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.81.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.3:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.3:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.aarch64", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.s390x", "openSUSE Leap Micro 5.4:kernel-default-5.14.21-150400.24.81.1.x86_64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.aarch64", "openSUSE Leap Micro 5.4:kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2023-08-14T15:35:23Z", details: "important", }, ], title: "CVE-2023-4004", }, ], }
WID-SEC-W-2023-1669
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Das Android Betriebssystem ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen.", title: "Angriff", }, { category: "general", text: "- Android", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-1669 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1669.json", }, { category: "self", summary: "WID-SEC-2023-1669 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1669", }, { category: "external", summary: "Ubuntu Security Notice USN-6348-1 vom 2023-09-06", url: "https://ubuntu.com/security/notices/USN-6348-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6315-1 vom 2023-08-29", url: "https://ubuntu.com/security/notices/USN-6315-1", }, { category: "external", summary: "Samsung Patchday July 2023 vom 2023-07-13", url: "https://security.samsungmobile.com/securityUpdate.smsb", }, { category: "external", summary: "Pixel Patchday July 2023 vom 2023-07-05", url: "https://source.android.com/docs/security/bulletin/pixel/2023-07-01?hl=de", }, { category: "external", summary: "Android Patchday July 2023 vom 2023-07-05", url: "https://source.android.com/docs/security/bulletin/2023-07-01", }, ], source_lang: "en-US", title: "Android Patchday Juli 2023", tracking: { current_release_date: "2023-09-06T22:00:00.000+00:00", generator: { date: "2024-08-15T17:54:20.171+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-1669", initial_release_date: "2023-07-05T22:00:00.000+00:00", revision_history: [ { date: "2023-07-05T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-07-13T22:00:00.000+00:00", number: "2", summary: "Neue Updates von Samsung aufgenommen", }, { date: "2023-08-29T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2023-09-06T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Ubuntu aufgenommen", }, ], status: "final", version: "4", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Google Android 12L", product: { name: "Google Android 12L", product_id: "1185256", product_identification_helper: { cpe: "cpe:/o:google:android:12l", }, }, }, { category: "product_name", name: "Google Android 11", product: { name: "Google Android 11", product_id: "T017166", product_identification_helper: { cpe: "cpe:/o:google:android:11", }, }, }, { category: "product_name", name: "Google Android 12", product: { name: "Google Android 12", product_id: "T020881", product_identification_helper: { cpe: "cpe:/o:google:android:12", }, }, }, { category: "product_name", name: "Google Android 13", product: { name: "Google Android 13", product_id: "T024488", product_identification_helper: { cpe: "cpe:/o:google:android:13", }, }, }, ], category: "product_name", name: "Android", }, ], category: "vendor", name: "Google", }, { branches: [ { category: "product_name", name: "Samsung Android", product: { name: "Samsung Android", product_id: "T027059", product_identification_helper: { cpe: "cpe:/o:samsung:android:-", }, }, }, ], category: "vendor", name: "Samsung", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2023-35694", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-35694", }, { cve: "CVE-2023-35693", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-35693", }, { cve: "CVE-2023-35692", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-35692", }, { cve: "CVE-2023-35691", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-35691", }, { cve: "CVE-2023-30671", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30671", }, { cve: "CVE-2023-30670", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30670", }, { cve: "CVE-2023-30669", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30669", }, { cve: "CVE-2023-30668", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30668", }, { cve: "CVE-2023-30667", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30667", }, { cve: "CVE-2023-30666", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30666", }, { cve: "CVE-2023-30665", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30665", }, { cve: "CVE-2023-30664", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30664", }, { cve: "CVE-2023-30663", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30663", }, { cve: "CVE-2023-30662", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30662", }, { cve: "CVE-2023-30661", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30661", }, { cve: "CVE-2023-30660", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30660", }, { cve: "CVE-2023-30659", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30659", }, { cve: "CVE-2023-30658", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30658", }, { cve: "CVE-2023-30657", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30657", }, { cve: "CVE-2023-30656", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30656", }, { cve: "CVE-2023-30655", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30655", }, { cve: "CVE-2023-30653", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30653", }, { cve: "CVE-2023-30652", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30652", }, { cve: "CVE-2023-30651", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30651", }, { cve: "CVE-2023-30650", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30650", }, { cve: "CVE-2023-30649", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30649", }, { cve: "CVE-2023-30648", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30648", }, { cve: "CVE-2023-30647", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30647", }, { cve: "CVE-2023-30646", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30646", }, { cve: "CVE-2023-30645", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30645", }, { cve: "CVE-2023-30644", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30644", }, { cve: "CVE-2023-30643", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30643", }, { cve: "CVE-2023-30642", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30642", }, { cve: "CVE-2023-30641", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30641", }, { cve: "CVE-2023-30640", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30640", }, { cve: "CVE-2023-28542", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-28542", }, { cve: "CVE-2023-28541", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-28541", }, { cve: "CVE-2023-28147", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-28147", }, { cve: "CVE-2023-26083", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-26083", }, { cve: "CVE-2023-25012", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-25012", }, { cve: "CVE-2023-24854", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-24854", }, { cve: "CVE-2023-24851", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-24851", }, { cve: "CVE-2023-22667", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-22667", }, { cve: "CVE-2023-22387", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-22387", }, { cve: "CVE-2023-22386", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-22386", }, { cve: "CVE-2023-21672", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21672", }, { cve: "CVE-2023-21670", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21670", }, { cve: "CVE-2023-21669", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21669", }, { cve: "CVE-2023-21661", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21661", }, { cve: "CVE-2023-21659", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21659", }, { cve: "CVE-2023-21658", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21658", }, { cve: "CVE-2023-21657", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21657", }, { cve: "CVE-2023-21656", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21656", }, { cve: "CVE-2023-21641", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21641", }, { cve: "CVE-2023-21640", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21640", }, { cve: "CVE-2023-21639", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21639", }, { cve: "CVE-2023-21638", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21638", }, { cve: "CVE-2023-21637", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21637", }, { cve: "CVE-2023-21635", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21635", }, { cve: "CVE-2023-21633", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21633", }, { cve: "CVE-2023-21631", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21631", }, { cve: "CVE-2023-21629", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21629", }, { cve: "CVE-2023-21628", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21628", }, { cve: "CVE-2023-21624", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21624", }, { cve: "CVE-2023-21400", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21400", }, { cve: "CVE-2023-21399", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21399", }, { cve: "CVE-2023-2136", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-2136", }, { cve: "CVE-2023-21262", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21262", }, { cve: "CVE-2023-21261", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21261", }, { cve: "CVE-2023-21257", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21257", }, { cve: "CVE-2023-21256", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21256", }, { cve: "CVE-2023-21255", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21255", }, { cve: "CVE-2023-21254", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21254", }, { cve: "CVE-2023-21251", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21251", }, { cve: "CVE-2023-21250", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21250", }, { cve: "CVE-2023-21249", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21249", }, { cve: "CVE-2023-21248", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21248", }, { cve: "CVE-2023-21247", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21247", }, { cve: "CVE-2023-21246", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21246", }, { cve: "CVE-2023-21245", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21245", }, { cve: "CVE-2023-21243", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21243", }, { cve: "CVE-2023-21241", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21241", }, { cve: "CVE-2023-21240", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21240", }, { cve: "CVE-2023-21239", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21239", }, { cve: "CVE-2023-21238", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21238", }, { cve: "CVE-2023-21145", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21145", }, { cve: "CVE-2023-21120", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21120", }, { cve: "CVE-2023-21101", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21101", }, { cve: "CVE-2023-21087", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21087", }, { cve: "CVE-2023-20942", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-20942", }, { cve: "CVE-2023-20918", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-20918", }, { cve: "CVE-2023-20910", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-20910", }, { cve: "CVE-2023-20755", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-20755", }, { cve: "CVE-2023-20754", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-20754", }, { cve: "CVE-2022-48438", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-48438", }, { cve: "CVE-2022-48392", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-48392", }, { cve: "CVE-2022-48391", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-48391", }, { cve: "CVE-2022-48390", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-48390", }, { cve: "CVE-2022-46781", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-46781", }, { cve: "CVE-2022-42703", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-42703", }, { cve: "CVE-2022-40538", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-40538", }, { cve: "CVE-2022-40536", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-40536", }, { cve: "CVE-2022-40533", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-40533", }, { cve: "CVE-2022-40529", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-40529", }, { cve: "CVE-2022-40523", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-40523", }, { cve: "CVE-2022-40521", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-40521", }, { cve: "CVE-2022-40520", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-40520", }, { cve: "CVE-2022-40517", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-40517", }, { cve: "CVE-2022-40516", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-40516", }, { cve: "CVE-2022-33292", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-33292", }, { cve: "CVE-2022-33264", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-33264", }, { cve: "CVE-2022-33257", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-33257", }, { cve: "CVE-2022-33251", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-33251", }, { cve: "CVE-2022-28350", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-28350", }, { cve: "CVE-2022-28349", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-28349", }, { cve: "CVE-2022-22706", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-22706", }, { cve: "CVE-2022-22060", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-22060", }, { cve: "CVE-2021-29256", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2021-29256", }, { cve: "CVE-2021-0948", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2021-0948", }, { cve: "CVE-2021-0945", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2021-0945", }, { cve: "CVE-2021-0701", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2021-0701", }, ], }
wid-sec-w-2023-1669
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Das Android Betriebssystem ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen.", title: "Angriff", }, { category: "general", text: "- Android", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-1669 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1669.json", }, { category: "self", summary: "WID-SEC-2023-1669 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1669", }, { category: "external", summary: "Ubuntu Security Notice USN-6348-1 vom 2023-09-06", url: "https://ubuntu.com/security/notices/USN-6348-1", }, { category: "external", summary: "Ubuntu Security Notice USN-6315-1 vom 2023-08-29", url: "https://ubuntu.com/security/notices/USN-6315-1", }, { category: "external", summary: "Samsung Patchday July 2023 vom 2023-07-13", url: "https://security.samsungmobile.com/securityUpdate.smsb", }, { category: "external", summary: "Pixel Patchday July 2023 vom 2023-07-05", url: "https://source.android.com/docs/security/bulletin/pixel/2023-07-01?hl=de", }, { category: "external", summary: "Android Patchday July 2023 vom 2023-07-05", url: "https://source.android.com/docs/security/bulletin/2023-07-01", }, ], source_lang: "en-US", title: "Android Patchday Juli 2023", tracking: { current_release_date: "2023-09-06T22:00:00.000+00:00", generator: { date: "2024-08-15T17:54:20.171+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-1669", initial_release_date: "2023-07-05T22:00:00.000+00:00", revision_history: [ { date: "2023-07-05T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-07-13T22:00:00.000+00:00", number: "2", summary: "Neue Updates von Samsung aufgenommen", }, { date: "2023-08-29T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2023-09-06T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Ubuntu aufgenommen", }, ], status: "final", version: "4", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Google Android 12L", product: { name: "Google Android 12L", product_id: "1185256", product_identification_helper: { cpe: "cpe:/o:google:android:12l", }, }, }, { category: "product_name", name: "Google Android 11", product: { name: "Google Android 11", product_id: "T017166", product_identification_helper: { cpe: "cpe:/o:google:android:11", }, }, }, { category: "product_name", name: "Google Android 12", product: { name: "Google Android 12", product_id: "T020881", product_identification_helper: { cpe: "cpe:/o:google:android:12", }, }, }, { category: "product_name", name: "Google Android 13", product: { name: "Google Android 13", product_id: "T024488", product_identification_helper: { cpe: "cpe:/o:google:android:13", }, }, }, ], category: "product_name", name: "Android", }, ], category: "vendor", name: "Google", }, { branches: [ { category: "product_name", name: "Samsung Android", product: { name: "Samsung Android", product_id: "T027059", product_identification_helper: { cpe: "cpe:/o:samsung:android:-", }, }, }, ], category: "vendor", name: "Samsung", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2023-35694", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-35694", }, { cve: "CVE-2023-35693", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-35693", }, { cve: "CVE-2023-35692", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-35692", }, { cve: "CVE-2023-35691", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-35691", }, { cve: "CVE-2023-30671", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30671", }, { cve: "CVE-2023-30670", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30670", }, { cve: "CVE-2023-30669", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30669", }, { cve: "CVE-2023-30668", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30668", }, { cve: "CVE-2023-30667", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30667", }, { cve: "CVE-2023-30666", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30666", }, { cve: "CVE-2023-30665", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30665", }, { cve: "CVE-2023-30664", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30664", }, { cve: "CVE-2023-30663", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30663", }, { cve: "CVE-2023-30662", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30662", }, { cve: "CVE-2023-30661", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30661", }, { cve: "CVE-2023-30660", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30660", }, { cve: "CVE-2023-30659", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30659", }, { cve: "CVE-2023-30658", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30658", }, { cve: "CVE-2023-30657", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30657", }, { cve: "CVE-2023-30656", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30656", }, { cve: "CVE-2023-30655", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30655", }, { cve: "CVE-2023-30653", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30653", }, { cve: "CVE-2023-30652", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30652", }, { cve: "CVE-2023-30651", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30651", }, { cve: "CVE-2023-30650", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30650", }, { cve: "CVE-2023-30649", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30649", }, { cve: "CVE-2023-30648", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30648", }, { cve: "CVE-2023-30647", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30647", }, { cve: "CVE-2023-30646", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30646", }, { cve: "CVE-2023-30645", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30645", }, { cve: "CVE-2023-30644", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30644", }, { cve: "CVE-2023-30643", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30643", }, { cve: "CVE-2023-30642", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30642", }, { cve: "CVE-2023-30641", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30641", }, { cve: "CVE-2023-30640", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-30640", }, { cve: "CVE-2023-28542", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-28542", }, { cve: "CVE-2023-28541", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-28541", }, { cve: "CVE-2023-28147", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-28147", }, { cve: "CVE-2023-26083", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-26083", }, { cve: "CVE-2023-25012", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-25012", }, { cve: "CVE-2023-24854", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-24854", }, { cve: "CVE-2023-24851", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-24851", }, { cve: "CVE-2023-22667", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-22667", }, { cve: "CVE-2023-22387", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-22387", }, { cve: "CVE-2023-22386", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-22386", }, { cve: "CVE-2023-21672", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21672", }, { cve: "CVE-2023-21670", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21670", }, { cve: "CVE-2023-21669", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21669", }, { cve: "CVE-2023-21661", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21661", }, { cve: "CVE-2023-21659", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21659", }, { cve: "CVE-2023-21658", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21658", }, { cve: "CVE-2023-21657", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21657", }, { cve: "CVE-2023-21656", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21656", }, { cve: "CVE-2023-21641", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21641", }, { cve: "CVE-2023-21640", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21640", }, { cve: "CVE-2023-21639", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21639", }, { cve: "CVE-2023-21638", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21638", }, { cve: "CVE-2023-21637", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21637", }, { cve: "CVE-2023-21635", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21635", }, { cve: "CVE-2023-21633", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21633", }, { cve: "CVE-2023-21631", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21631", }, { cve: "CVE-2023-21629", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21629", }, { cve: "CVE-2023-21628", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21628", }, { cve: "CVE-2023-21624", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21624", }, { cve: "CVE-2023-21400", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21400", }, { cve: "CVE-2023-21399", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21399", }, { cve: "CVE-2023-2136", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-2136", }, { cve: "CVE-2023-21262", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21262", }, { cve: "CVE-2023-21261", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21261", }, { cve: "CVE-2023-21257", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21257", }, { cve: "CVE-2023-21256", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21256", }, { cve: "CVE-2023-21255", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21255", }, { cve: "CVE-2023-21254", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21254", }, { cve: "CVE-2023-21251", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21251", }, { cve: "CVE-2023-21250", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21250", }, { cve: "CVE-2023-21249", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21249", }, { cve: "CVE-2023-21248", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21248", }, { cve: "CVE-2023-21247", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21247", }, { cve: "CVE-2023-21246", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21246", }, { cve: "CVE-2023-21245", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21245", }, { cve: "CVE-2023-21243", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21243", }, { cve: "CVE-2023-21241", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21241", }, { cve: "CVE-2023-21240", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21240", }, { cve: "CVE-2023-21239", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21239", }, { cve: "CVE-2023-21238", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21238", }, { cve: "CVE-2023-21145", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21145", }, { cve: "CVE-2023-21120", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21120", }, { cve: "CVE-2023-21101", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21101", }, { cve: "CVE-2023-21087", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-21087", }, { cve: "CVE-2023-20942", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-20942", }, { cve: "CVE-2023-20918", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-20918", }, { cve: "CVE-2023-20910", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-20910", }, { cve: "CVE-2023-20755", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-20755", }, { cve: "CVE-2023-20754", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2023-20754", }, { cve: "CVE-2022-48438", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-48438", }, { cve: "CVE-2022-48392", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-48392", }, { cve: "CVE-2022-48391", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-48391", }, { cve: "CVE-2022-48390", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-48390", }, { cve: "CVE-2022-46781", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-46781", }, { cve: "CVE-2022-42703", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-42703", }, { cve: "CVE-2022-40538", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-40538", }, { cve: "CVE-2022-40536", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-40536", }, { cve: "CVE-2022-40533", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-40533", }, { cve: "CVE-2022-40529", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-40529", }, { cve: "CVE-2022-40523", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-40523", }, { cve: "CVE-2022-40521", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-40521", }, { cve: "CVE-2022-40520", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-40520", }, { cve: "CVE-2022-40517", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-40517", }, { cve: "CVE-2022-40516", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-40516", }, { cve: "CVE-2022-33292", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-33292", }, { cve: "CVE-2022-33264", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-33264", }, { cve: "CVE-2022-33257", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-33257", }, { cve: "CVE-2022-33251", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-33251", }, { cve: "CVE-2022-28350", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-28350", }, { cve: "CVE-2022-28349", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-28349", }, { cve: "CVE-2022-22706", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-22706", }, { cve: "CVE-2022-22060", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2022-22060", }, { cve: "CVE-2021-29256", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2021-29256", }, { cve: "CVE-2021-0948", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2021-0948", }, { cve: "CVE-2021-0945", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2021-0945", }, { cve: "CVE-2021-0701", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Kernel\", \"Kernel-Komponenten\", \"ARM-Komponenten\", \"Imagination Technologies\", \"MediaTek Komponenten\", \"Pixel\", \"Qualcomm-Komponenten\" sowie \"Qualcomm Closed-Source-Komponenten\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erweitern, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "T000126", "1185256", "T024488", "T020881", "T027059", "T017166", ], }, release_date: "2023-07-05T22:00:00.000+00:00", title: "CVE-2021-0701", }, ], }
ghsa-xjm8-9w9g-9h2f
Vulnerability from github
In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.
{ affected: [], aliases: [ "CVE-2023-21400", ], database_specific: { cwe_ids: [ "CWE-667", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2023-07-13T00:15:24Z", severity: "MODERATE", }, details: "In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.", id: "GHSA-xjm8-9w9g-9h2f", modified: "2025-02-13T18:31:40Z", published: "2023-07-13T00:30:33Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2023-21400", }, { type: "WEB", url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", }, { type: "WEB", url: "https://security.netapp.com/advisory/ntap-20240119-0012", }, { type: "WEB", url: "https://source.android.com/security/bulletin/pixel/2023-07-01", }, { type: "WEB", url: "https://www.debian.org/security/2023/dsa-5480", }, { type: "WEB", url: "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2023/07/14/2", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2023/07/19/2", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2023/07/19/7", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2023/07/25/7", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
gsd-2023-21400
Vulnerability from gsd
{ GSD: { alias: "CVE-2023-21400", id: "GSD-2023-21400", }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2023-21400", ], details: "In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.\n\n", id: "GSD-2023-21400", modified: "2023-12-13T01:20:25.198563Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "security@android.com", ID: "CVE-2023-21400", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Android", version: { version_data: [ { version_affected: "=", version_value: "Android kernel", }, ], }, }, ], }, vendor_name: "Google", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.\n\n", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Elevation of privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://source.android.com/security/bulletin/pixel/2023-07-01", refsource: "MISC", url: "https://source.android.com/security/bulletin/pixel/2023-07-01", }, { name: "http://www.openwall.com/lists/oss-security/2023/07/14/2", refsource: "MISC", url: "http://www.openwall.com/lists/oss-security/2023/07/14/2", }, { name: "http://www.openwall.com/lists/oss-security/2023/07/19/2", refsource: "MISC", url: "http://www.openwall.com/lists/oss-security/2023/07/19/2", }, { name: "http://www.openwall.com/lists/oss-security/2023/07/19/7", refsource: "MISC", url: "http://www.openwall.com/lists/oss-security/2023/07/19/7", }, { name: "http://www.openwall.com/lists/oss-security/2023/07/25/7", refsource: "MISC", url: "http://www.openwall.com/lists/oss-security/2023/07/25/7", }, { name: "https://www.debian.org/security/2023/dsa-5480", refsource: "MISC", url: "https://www.debian.org/security/2023/dsa-5480", }, { name: "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html", }, { name: "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", refsource: "MISC", url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", }, { name: "https://security.netapp.com/advisory/ntap-20240119-0012/", refsource: "MISC", url: "https://security.netapp.com/advisory/ntap-20240119-0012/", }, ], }, }, "nvd.nist.gov": { cve: { configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", matchCriteriaId: "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", matchCriteriaId: "FA6FEEC2-9F11-4643-8827-749718254FED", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], descriptions: [ { lang: "en", value: "In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.\n\n", }, ], id: "CVE-2023-21400", lastModified: "2024-01-19T16:15:08.817", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-07-13T00:15:24.340", references: [ { source: "security@android.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html", }, { source: "security@android.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2023/07/14/2", }, { source: "security@android.com", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2023/07/19/2", }, { source: "security@android.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2023/07/19/7", }, { source: "security@android.com", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2023/07/25/7", }, { source: "security@android.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", }, { source: "security@android.com", url: "https://security.netapp.com/advisory/ntap-20240119-0012/", }, { source: "security@android.com", tags: [ "Vendor Advisory", ], url: "https://source.android.com/security/bulletin/pixel/2023-07-01", }, { source: "security@android.com", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2023/dsa-5480", }, ], sourceIdentifier: "security@android.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-667", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }, }, }, }
var-202307-0874
Vulnerability from variot
In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation. Google of Android Products from multiple vendors, such as Microsoft, contain vulnerabilities related to resource locking.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Google Pixel is a smart phone of Google (Google). -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Debian Security Advisory DSA-5480-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso August 18, 2023 https://www.debian.org/security/faq
Package : linux CVE ID : CVE-2022-4269 CVE-2022-39189 CVE-2023-1206 CVE-2023-1380 CVE-2023-2002 CVE-2023-2007 CVE-2023-2124 CVE-2023-2269 CVE-2023-2898 CVE-2023-3090 CVE-2023-3111 CVE-2023-3212 CVE-2023-3268 CVE-2023-3338 CVE-2023-3389 CVE-2023-3609 CVE-2023-3611 CVE-2023-3776 CVE-2023-3863 CVE-2023-4004 CVE-2023-4128 CVE-2023-4132 CVE-2023-4147 CVE-2023-4194 CVE-2023-4273 CVE-2023-20588 CVE-2023-21255 CVE-2023-21400 CVE-2023-31084 CVE-2023-34319 CVE-2023-35788 CVE-2023-40283
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.
CVE-2023-1206
It was discovered that the networking stack permits attackers to
force hash collisions in the IPv6 connection lookup table, which may
result in denial of service (significant increase in the cost of
lookups, increased CPU utilization).
CVE-2023-1380
Jisoo Jang reported a heap out-of-bounds read in the brcmfmac Wi-Fi
driver.
CVE-2023-2007
Lucas Leong and Reno Robert discovered a time-of-check-to-time-of-
use flaw in the dpt_i2o SCSI controller driver.
This flaw has been mitigated by removing support for the I2OUSRCMD
operation.
CVE-2023-2124
Kyle Zeng, Akshay Ajayan and Fish Wang discovered that missing
metadata validation may result in denial of service or potential
privilege escalation if a corrupted XFS disk image is mounted.
CVE-2023-2898
It was discovered that missing sanitising in the f2fs file
system may result in denial of service if a malformed file
system is accessed.
CVE-2023-3111
The TOTE Robot tool found a flaw in the Btrfs filesystem driver that
can lead to a use-after-free.
CVE-2023-3212
Yang Lan that missing validation in the GFS2 filesystem could result
in denial of service via a NULL pointer dereference when mounting a
malformed GFS2 filesystem.
This flaw has been mitigated by removing the DECnet protocol
implementation.
CVE-2023-3389
Querijn Voet discovered a use-after-free in the io_uring subsystem,
which may result in denial of service or privilege escalation.
CVE-2023-4004
It was discovered that a use-after-free in Netfilter's
implementation of PIPAPO (PIle PAcket POlicies) may result in denial
of service or potential local privilege escalation for a user with
the CAP_NET_ADMIN capability in any user or network namespace.
CVE-2023-4194
A type confusion in the implementation of TUN/TAP network devices
may allow a local user to bypass network filters.
CVE-2023-4273
Maxim Suhanov discovered a stack overflow in the exFAT driver, which
may result in local denial of service via a malformed file system.
CVE-2023-20588
Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Koepf and
Oleksii Oleksenko discovered that on some AMD CPUs with the Zen1
micro architecture an integer division by zero may leave stale
quotient data from a previous division, resulting in a potential
leak of sensitive data.
CVE-2023-21255
A use-after-free was discovered in the in the Android binder driver,
which may result in local privilege escalation on systems where the
binder driver is loaded.
CVE-2023-34319
Ross Lagerwall discovered a buffer overrun in Xen's netback driver
which may allow a Xen guest to cause denial of service to the
virtualisation host my sending malformed packets.
CVE-2023-40283
A use-after-free was discovered in Bluetooth L2CAP socket handling.
For the oldstable distribution (bullseye), these problems have been fixed in version 5.10.191-1.
We recommend that you upgrade your linux packages.
For the detailed security status of linux please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linux
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmTfvC5fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0QmDBAAnjvIhfwWPmYeanAyC9Hwdx2L9ATqx235c5K4I9xOWCRR+1oiM3WIKDz1 jnFbRnCKEPMUeIMWaSwXj11OvjDIY31nnUqRzf/hoT8PQ6dHi1p/fpmjReLFL9sw FoYhyabKtkGMBUXF4dCz2Qn62yPGFDgupBMlK1BQ1kJvxZABaKG0PGTqqPX4iOla DkbNvwq2lLr0K6oYKp8Nu+tQ+1I6U8PI4EvAlYbybvo0WXvbZy9pOmBilJhBqYrC 6Ql1ndovBzDi3H8Qo+C8WJRdFcjP+dBOpW/lu9EcHbNmHG1cWLO8EexqvfoW8GAV qf0CEtULUwsn6pM5uW+SEgfsiETFPXbzQt+FxH2L2NGLhLmb73dIK074/Ids8lx4 V4tNh+pVTli+sTCB6uGaRQvM4uNTxm5mV9+saacM6vel6KvD/qRreCMCDhvk9CkS ETg3sJjbw/Hv83RwfqTlXicJh5KpA5JikrztMnHNAQKru93uSH6dOLpOd45/SeA8 KHw604LkeuzAiqFltE76HS1h/jDXO0Mfb0UvIH5N1tmgcr3qaRaFvZQ6sYy8NTHa 6N5pnfKJJXRuYe/aadjlC2xQmUMvU8HD39dqp6Z+XFjjzLmz5NN9rLHZKqaLSx6C IFId+FMkkKLeQFWylM+mA5WwiUTEx0JvREFPjtOjJ4RDHf3Mmws= =z/8h -----END PGP SIGNATURE----- . ========================================================================== Ubuntu Security Notice USN-6332-1 August 31, 2023
linux-azure, linux-azure-5.15, linux-azure-fde vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description: - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-azure-fde: Linux kernel for Microsoft Azure CVM cloud systems - linux-azure-5.15: Linux kernel for Microsoft Azure cloud systems
Details:
Daniel Moghimi discovered that some Intel(R) Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensitive information. (CVE-2022-40982)
William Zhao discovered that the Traffic Control (TC) subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2022-4269)
It was discovered that the NTFS file system implementation in the Linux kernel did not properly check buffer indexes in certain situations, leading to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2022-48502)
Seth Jenkins discovered that the Linux kernel did not properly perform address randomization for a per-cpu memory management structure. A local attacker could use this to expose sensitive information (kernel memory) or in conjunction with another kernel vulnerability. (CVE-2023-0597)
It was discovered that a race condition existed in the btrfs file system implementation in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2023-1611)
It was discovered that the APM X-Gene SoC hardware monitoring driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or expose sensitive information (kernel memory). (CVE-2023-1855)
It was discovered that the ST NCI NFC driver did not properly handle device removal events. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2023-1990)
Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did not properly perform permissions checks when handling HCI sockets. A physically proximate attacker could use this to cause a denial of service (bluetooth communication). (CVE-2023-2002)
Tavis Ormandy discovered that some AMD processors did not properly handle speculative execution of certain vector register instructions. A local attacker could use this to expose sensitive information. (CVE-2023-20593)
It was discovered that the XFS file system implementation in the Linux kernel did not properly perform metadata validation when mounting certain images. An attacker could use this to specially craft a file system image that, when mounted, could cause a denial of service (system crash). (CVE-2023-2124)
Ye Zhang and Nicolas Wu discovered that the io_uring subsystem in the Linux kernel did not properly handle locking for rings with IOPOLL, leading to a double-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-21400)
Juan Jose Lopez Jaimez, Meador Inge, Simon Scannell, and Nenad Stojanovski discovered that the BPF verifier in the Linux kernel did not properly mark registers for precision tracking in certain situations, leading to an out- of-bounds access vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-2163)
It was discovered that the SLIMpro I2C device driver in the Linux kernel did not properly validate user-supplied data in some situations, leading to an out-of-bounds write vulnerability. A privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-2194)
It was discovered that the perf subsystem in the Linux kernel contained a use-after-free vulnerability. A privileged local attacker could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-2235)
Zheng Zhang discovered that the device-mapper implementation in the Linux kernel did not properly handle locking during table_clear() operations. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2023-2269)
It was discovered that the ARM Mali Display Processor driver implementation in the Linux kernel did not properly handle certain error conditions. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-23004)
It was discovered that a race condition existed in the TLS subsystem in the Linux kernel, leading to a use-after-free or a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-28466)
It was discovered that the DA9150 charger driver in the Linux kernel did not properly handle device removal, leading to a user-after free vulnerability. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-30772)
It was discovered that the Ricoh R5C592 MemoryStick card reader driver in the Linux kernel contained a race condition during module unload, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3141)
Quentin Minster discovered that the KSMBD implementation in the Linux kernel did not properly validate pointers in some situations, leading to a null pointer dereference vulnerability. A remote attacker could use this to cause a denial of service (system crash). (CVE-2023-32248)
It was discovered that the kernel->user space relay implementation in the Linux kernel did not properly perform certain buffer calculations, leading to an out-of-bounds read vulnerability. A local attacker could use this to cause a denial of service (system crash) or expose sensitive information (kernel memory). (CVE-2023-3268)
It was discovered that the Qualcomm EMAC ethernet driver in the Linux kernel did not properly handle device removal, leading to a user-after free vulnerability. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-33203)
It was discovered that the BQ24190 charger driver in the Linux kernel did not properly handle device removal, leading to a user-after free vulnerability. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-33288)
It was discovered that the video4linux driver for Philips based TV cards in the Linux kernel contained a race condition during device removal, leading to a use-after-free vulnerability. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-35823)
It was discovered that the SDMC DM1105 PCI device driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-35824)
It was discovered that the Renesas USB controller driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-35828)
It was discovered that the Rockchip Video Decoder IP driver in the Linux kernel contained a race condition during device removal, leading to a use- after-free vulnerability. A privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-35829)
It was discovered that the universal 32bit network packet classifier implementation in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3609)
It was discovered that the netfilter subsystem in the Linux kernel did not properly handle certain error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3610)
It was discovered that the Quick Fair Queueing network scheduler implementation in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3611)
It was discovered that the network packet classifier with netfilter/firewall marks implementation in the Linux kernel did not properly handle reference counting, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-3776)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel did not properly handle table rules flush in certain circumstances. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2023-3777)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel did not properly handle rule additions to bound chains in certain circumstances. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2023-3995)
It was discovered that the netfilter subsystem in the Linux kernel did not properly handle PIPAPO element removal, leading to a use-after-free vulnerability. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2023-4004)
Kevin Rich discovered that the netfilter subsystem in the Linux kernel did not properly handle bound chain deactivation in certain circumstances. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2023-4015)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04 LTS: linux-image-5.15.0-1045-azure 5.15.0-1045.52 linux-image-5.15.0-1045-azure-fde 5.15.0-1045.52.1 linux-image-azure-fde-lts-22.04 5.15.0.1045.52.23 linux-image-azure-lts-22.04 5.15.0.1045.41
Ubuntu 20.04 LTS: linux-image-5.15.0-1045-azure 5.15.0-1045.52~20.04.1 linux-image-azure 5.15.0.1045.52~20.04.34 linux-image-azure-cvm 5.15.0.1045.52~20.04.34
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: https://ubuntu.com/security/notices/USN-6332-1 CVE-2022-40982, CVE-2022-4269, CVE-2022-48502, CVE-2023-0597, CVE-2023-1611, CVE-2023-1855, CVE-2023-1990, CVE-2023-2002, CVE-2023-20593, CVE-2023-2124, CVE-2023-21400, CVE-2023-2163, CVE-2023-2194, CVE-2023-2235, CVE-2023-2269, CVE-2023-23004, CVE-2023-28466, CVE-2023-30772, CVE-2023-3141, CVE-2023-32248, CVE-2023-3268, CVE-2023-33203, CVE-2023-33288, CVE-2023-35823, CVE-2023-35824, CVE-2023-35828, CVE-2023-35829, CVE-2023-3609, CVE-2023-3610, CVE-2023-3611, CVE-2023-3776, CVE-2023-3777, CVE-2023-3995, CVE-2023-4004, CVE-2023-4015
Package Information: https://launchpad.net/ubuntu/+source/linux-azure/5.15.0-1045.52 https://launchpad.net/ubuntu/+source/linux-azure-fde/5.15.0-1045.52.1 https://launchpad.net/ubuntu/+source/linux-azure-5.15/5.15.0-1045.52~20.04.1
.
Livepatches for supported HWE kernels which are not based on an LTS kernel version will receive upgrades for a period of up to 9 months after the build date of the kernel, or until the end of support for that kernel’s non-LTS distro release version, whichever is sooner
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202307-0874", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "android", scope: "eq", trust: 1, vendor: "google", version: null, }, { model: "linux", scope: "eq", trust: 1, vendor: "debian", version: "10.0", }, { model: "linux", scope: "eq", trust: 1, vendor: "debian", version: "11.0", }, { model: "gnu/linux", scope: null, trust: 0.8, vendor: "debian", version: null, }, { model: "android", scope: null, trust: 0.8, vendor: "google", version: null, }, { model: "pixel", scope: null, trust: 0.6, vendor: "google", version: null, }, ], sources: [ { db: "CNVD", id: "CNVD-2023-65161", }, { db: "JVNDB", id: "JVNDB-2023-021902", }, { db: "NVD", id: "CVE-2023-21400", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Ubuntu", sources: [ { db: "PACKETSTORM", id: "174401", }, { db: "PACKETSTORM", id: "174453", }, { db: "PACKETSTORM", id: "174433", }, { db: "PACKETSTORM", id: "174449", }, { db: "PACKETSTORM", id: "174534", }, ], trust: 0.5, }, cve: "CVE-2023-21400", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "MULTIPLE", author: "CNVD", availabilityImpact: "COMPLETE", baseScore: 6.5, confidentialityImpact: "COMPLETE", exploitabilityScore: 2.5, id: "CNVD-2023-65161", impactScore: 10, integrityImpact: "COMPLETE", severity: "MEDIUM", trust: 0.6, vectorString: "AV:L/AC:L/Au:M/C:C/I:C/A:C", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "LOCAL", author: "nvd@nist.gov", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", exploitabilityScore: 0.8, id: "CVE-2023-21400", impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Local", author: "NVD", availabilityImpact: "High", baseScore: 6.7, baseSeverity: "Medium", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2023-21400", impactScore: null, integrityImpact: "High", privilegesRequired: "High", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "nvd@nist.gov", id: "CVE-2023-21400", trust: 1, value: "MEDIUM", }, { author: "NVD", id: "CVE-2023-21400", trust: 0.8, value: "Medium", }, { author: "CNVD", id: "CNVD-2023-65161", trust: 0.6, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-202307-1159", trust: 0.6, value: "MEDIUM", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2023-65161", }, { db: "JVNDB", id: "JVNDB-2023-021902", }, { db: "CNNVD", id: "CNNVD-202307-1159", }, { db: "NVD", id: "CVE-2023-21400", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation. Google of Android Products from multiple vendors, such as Microsoft, contain vulnerabilities related to resource locking.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Google Pixel is a smart phone of Google (Google). -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-5480-1 security@debian.org\nhttps://www.debian.org/security/ Salvatore Bonaccorso\nAugust 18, 2023 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : linux\nCVE ID : CVE-2022-4269 CVE-2022-39189 CVE-2023-1206 CVE-2023-1380\n CVE-2023-2002 CVE-2023-2007 CVE-2023-2124 CVE-2023-2269\n CVE-2023-2898 CVE-2023-3090 CVE-2023-3111 CVE-2023-3212\n CVE-2023-3268 CVE-2023-3338 CVE-2023-3389 CVE-2023-3609\n CVE-2023-3611 CVE-2023-3776 CVE-2023-3863 CVE-2023-4004\n CVE-2023-4128 CVE-2023-4132 CVE-2023-4147 CVE-2023-4194\n CVE-2023-4273 CVE-2023-20588 CVE-2023-21255 CVE-2023-21400\n CVE-2023-31084 CVE-2023-34319 CVE-2023-35788 CVE-2023-40283\n\nSeveral vulnerabilities have been discovered in the Linux kernel that\nmay lead to a privilege escalation, denial of service or information\nleaks. \n\nCVE-2023-1206\n\n It was discovered that the networking stack permits attackers to\n force hash collisions in the IPv6 connection lookup table, which may\n result in denial of service (significant increase in the cost of\n lookups, increased CPU utilization). \n\nCVE-2023-1380\n\n Jisoo Jang reported a heap out-of-bounds read in the brcmfmac Wi-Fi\n driver. \n\nCVE-2023-2007\n\n Lucas Leong and Reno Robert discovered a time-of-check-to-time-of-\n use flaw in the dpt_i2o SCSI controller driver. \n\n This flaw has been mitigated by removing support for the I2OUSRCMD\n operation. \n\nCVE-2023-2124\n\n Kyle Zeng, Akshay Ajayan and Fish Wang discovered that missing\n metadata validation may result in denial of service or potential\n privilege escalation if a corrupted XFS disk image is mounted. \n\nCVE-2023-2898\n\n It was discovered that missing sanitising in the f2fs file\n system may result in denial of service if a malformed file\n system is accessed. \n\nCVE-2023-3111\n\n The TOTE Robot tool found a flaw in the Btrfs filesystem driver that\n can lead to a use-after-free. \n\nCVE-2023-3212\n\n Yang Lan that missing validation in the GFS2 filesystem could result\n in denial of service via a NULL pointer dereference when mounting a\n malformed GFS2 filesystem. \n\n This flaw has been mitigated by removing the DECnet protocol\n implementation. \n\nCVE-2023-3389\n\n Querijn Voet discovered a use-after-free in the io_uring subsystem,\n which may result in denial of service or privilege escalation. \n\nCVE-2023-4004\n\n It was discovered that a use-after-free in Netfilter's\n implementation of PIPAPO (PIle PAcket POlicies) may result in denial\n of service or potential local privilege escalation for a user with\n the CAP_NET_ADMIN capability in any user or network namespace. \n\nCVE-2023-4194\n\n A type confusion in the implementation of TUN/TAP network devices\n may allow a local user to bypass network filters. \n\nCVE-2023-4273\n\n Maxim Suhanov discovered a stack overflow in the exFAT driver, which\n may result in local denial of service via a malformed file system. \n\nCVE-2023-20588\n\n Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Koepf and\n Oleksii Oleksenko discovered that on some AMD CPUs with the Zen1\n micro architecture an integer division by zero may leave stale\n quotient data from a previous division, resulting in a potential\n leak of sensitive data. \n\nCVE-2023-21255\n\n A use-after-free was discovered in the in the Android binder driver,\n which may result in local privilege escalation on systems where the\n binder driver is loaded. \n\nCVE-2023-34319\n\n Ross Lagerwall discovered a buffer overrun in Xen's netback driver\n which may allow a Xen guest to cause denial of service to the\n virtualisation host my sending malformed packets. \n\nCVE-2023-40283\n\n A use-after-free was discovered in Bluetooth L2CAP socket handling. \n\nFor the oldstable distribution (bullseye), these problems have been fixed\nin version 5.10.191-1. \n\nWe recommend that you upgrade your linux packages. \n\nFor the detailed security status of linux please refer to its security\ntracker page at:\nhttps://security-tracker.debian.org/tracker/linux\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n\niQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmTfvC5fFIAAAAAALgAo\naXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2\nNDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND\nz0QmDBAAnjvIhfwWPmYeanAyC9Hwdx2L9ATqx235c5K4I9xOWCRR+1oiM3WIKDz1\njnFbRnCKEPMUeIMWaSwXj11OvjDIY31nnUqRzf/hoT8PQ6dHi1p/fpmjReLFL9sw\nFoYhyabKtkGMBUXF4dCz2Qn62yPGFDgupBMlK1BQ1kJvxZABaKG0PGTqqPX4iOla\nDkbNvwq2lLr0K6oYKp8Nu+tQ+1I6U8PI4EvAlYbybvo0WXvbZy9pOmBilJhBqYrC\n6Ql1ndovBzDi3H8Qo+C8WJRdFcjP+dBOpW/lu9EcHbNmHG1cWLO8EexqvfoW8GAV\nqf0CEtULUwsn6pM5uW+SEgfsiETFPXbzQt+FxH2L2NGLhLmb73dIK074/Ids8lx4\nV4tNh+pVTli+sTCB6uGaRQvM4uNTxm5mV9+saacM6vel6KvD/qRreCMCDhvk9CkS\nETg3sJjbw/Hv83RwfqTlXicJh5KpA5JikrztMnHNAQKru93uSH6dOLpOd45/SeA8\nKHw604LkeuzAiqFltE76HS1h/jDXO0Mfb0UvIH5N1tmgcr3qaRaFvZQ6sYy8NTHa\n6N5pnfKJJXRuYe/aadjlC2xQmUMvU8HD39dqp6Z+XFjjzLmz5NN9rLHZKqaLSx6C\nIFId+FMkkKLeQFWylM+mA5WwiUTEx0JvREFPjtOjJ4RDHf3Mmws=\n=z/8h\n-----END PGP SIGNATURE-----\n. ==========================================================================\nUbuntu Security Notice USN-6332-1\nAugust 31, 2023\n\nlinux-azure, linux-azure-5.15, linux-azure-fde vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 22.04 LTS\n- Ubuntu 20.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. \n\nSoftware Description:\n- linux-azure: Linux kernel for Microsoft Azure Cloud systems\n- linux-azure-fde: Linux kernel for Microsoft Azure CVM cloud systems\n- linux-azure-5.15: Linux kernel for Microsoft Azure cloud systems\n\nDetails:\n\nDaniel Moghimi discovered that some Intel(R) Processors did not properly\nclear microarchitectural state after speculative execution of various\ninstructions. A local unprivileged user could use this to obtain to\nsensitive information. (CVE-2022-40982)\n\nWilliam Zhao discovered that the Traffic Control (TC) subsystem in the\nLinux kernel did not properly handle network packet retransmission in\ncertain situations. A local attacker could use this to cause a denial of\nservice (kernel deadlock). (CVE-2022-4269)\n\nIt was discovered that the NTFS file system implementation in the Linux\nkernel did not properly check buffer indexes in certain situations, leading\nto an out-of-bounds read vulnerability. A local attacker could possibly use\nthis to expose sensitive information (kernel memory). (CVE-2022-48502)\n\nSeth Jenkins discovered that the Linux kernel did not properly perform\naddress randomization for a per-cpu memory management structure. A local\nattacker could use this to expose sensitive information (kernel memory) or\nin conjunction with another kernel vulnerability. (CVE-2023-0597)\n\nIt was discovered that a race condition existed in the btrfs file system\nimplementation in the Linux kernel, leading to a use-after-free\nvulnerability. A local attacker could use this to cause a denial of service\n(system crash) or possibly expose sensitive information. (CVE-2023-1611)\n\nIt was discovered that the APM X-Gene SoC hardware monitoring driver in the\nLinux kernel contained a race condition, leading to a use-after-free\nvulnerability. A local attacker could use this to cause a denial of service\n(system crash) or expose sensitive information (kernel memory). \n(CVE-2023-1855)\n\nIt was discovered that the ST NCI NFC driver did not properly handle device\nremoval events. A physically proximate attacker could use this to cause a\ndenial of service (system crash). (CVE-2023-1990)\n\nRuihan Li discovered that the bluetooth subsystem in the Linux kernel did\nnot properly perform permissions checks when handling HCI sockets. A\nphysically proximate attacker could use this to cause a denial of service\n(bluetooth communication). (CVE-2023-2002)\n\nTavis Ormandy discovered that some AMD processors did not properly handle\nspeculative execution of certain vector register instructions. A local\nattacker could use this to expose sensitive information. (CVE-2023-20593)\n\nIt was discovered that the XFS file system implementation in the Linux\nkernel did not properly perform metadata validation when mounting certain\nimages. An attacker could use this to specially craft a file system image\nthat, when mounted, could cause a denial of service (system crash). \n(CVE-2023-2124)\n\nYe Zhang and Nicolas Wu discovered that the io_uring subsystem in the Linux\nkernel did not properly handle locking for rings with IOPOLL, leading to a\ndouble-free vulnerability. A local attacker could use this to cause a\ndenial of service (system crash) or possibly execute arbitrary code. \n(CVE-2023-21400)\n\nJuan Jose Lopez Jaimez, Meador Inge, Simon Scannell, and Nenad Stojanovski\ndiscovered that the BPF verifier in the Linux kernel did not properly mark\nregisters for precision tracking in certain situations, leading to an out-\nof-bounds access vulnerability. A local attacker could use this to cause a\ndenial of service (system crash) or possibly execute arbitrary code. \n(CVE-2023-2163)\n\nIt was discovered that the SLIMpro I2C device driver in the Linux kernel\ndid not properly validate user-supplied data in some situations, leading to\nan out-of-bounds write vulnerability. A privileged attacker could use this\nto cause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2023-2194)\n\nIt was discovered that the perf subsystem in the Linux kernel contained a\nuse-after-free vulnerability. A privileged local attacker could possibly\nuse this to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2023-2235)\n\nZheng Zhang discovered that the device-mapper implementation in the Linux\nkernel did not properly handle locking during table_clear() operations. A\nlocal attacker could use this to cause a denial of service (kernel\ndeadlock). (CVE-2023-2269)\n\nIt was discovered that the ARM Mali Display Processor driver implementation\nin the Linux kernel did not properly handle certain error conditions. A\nlocal attacker could possibly use this to cause a denial of service (system\ncrash). (CVE-2023-23004)\n\nIt was discovered that a race condition existed in the TLS subsystem in the\nLinux kernel, leading to a use-after-free or a null pointer dereference\nvulnerability. A local attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2023-28466)\n\nIt was discovered that the DA9150 charger driver in the Linux kernel did\nnot properly handle device removal, leading to a user-after free\nvulnerability. A physically proximate attacker could use this to cause a\ndenial of service (system crash) or possibly execute arbitrary code. \n(CVE-2023-30772)\n\nIt was discovered that the Ricoh R5C592 MemoryStick card reader driver in\nthe Linux kernel contained a race condition during module unload, leading\nto a use-after-free vulnerability. A local attacker could use this to cause\na denial of service (system crash) or possibly execute arbitrary code. \n(CVE-2023-3141)\n\nQuentin Minster discovered that the KSMBD implementation in the Linux\nkernel did not properly validate pointers in some situations, leading to a\nnull pointer dereference vulnerability. A remote attacker could use this to\ncause a denial of service (system crash). (CVE-2023-32248)\n\nIt was discovered that the kernel->user space relay implementation in the\nLinux kernel did not properly perform certain buffer calculations, leading\nto an out-of-bounds read vulnerability. A local attacker could use this to\ncause a denial of service (system crash) or expose sensitive information\n(kernel memory). (CVE-2023-3268)\n\nIt was discovered that the Qualcomm EMAC ethernet driver in the Linux\nkernel did not properly handle device removal, leading to a user-after free\nvulnerability. A physically proximate attacker could use this to cause a\ndenial of service (system crash) or possibly execute arbitrary code. \n(CVE-2023-33203)\n\nIt was discovered that the BQ24190 charger driver in the Linux kernel did\nnot properly handle device removal, leading to a user-after free\nvulnerability. A physically proximate attacker could use this to cause a\ndenial of service (system crash) or possibly execute arbitrary code. \n(CVE-2023-33288)\n\nIt was discovered that the video4linux driver for Philips based TV cards in\nthe Linux kernel contained a race condition during device removal, leading\nto a use-after-free vulnerability. A physically proximate attacker could\nuse this to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2023-35823)\n\nIt was discovered that the SDMC DM1105 PCI device driver in the Linux\nkernel contained a race condition during device removal, leading to a use-\nafter-free vulnerability. A physically proximate attacker could use this to\ncause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2023-35824)\n\nIt was discovered that the Renesas USB controller driver in the Linux\nkernel contained a race condition during device removal, leading to a use-\nafter-free vulnerability. A privileged attacker could use this to cause a\ndenial of service (system crash) or possibly execute arbitrary code. \n(CVE-2023-35828)\n\nIt was discovered that the Rockchip Video Decoder IP driver in the Linux\nkernel contained a race condition during device removal, leading to a use-\nafter-free vulnerability. A privileged attacker could use this to cause a\ndenial of service (system crash) or possibly execute arbitrary code. \n(CVE-2023-35829)\n\nIt was discovered that the universal 32bit network packet classifier\nimplementation in the Linux kernel did not properly perform reference\ncounting in some situations, leading to a use-after-free vulnerability. A\nlocal attacker could use this to cause a denial of service (system crash)\nor possibly execute arbitrary code. (CVE-2023-3609)\n\nIt was discovered that the netfilter subsystem in the Linux kernel did not\nproperly handle certain error conditions, leading to a use-after-free\nvulnerability. A local attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2023-3610)\n\nIt was discovered that the Quick Fair Queueing network scheduler\nimplementation in the Linux kernel contained an out-of-bounds write\nvulnerability. A local attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2023-3611)\n\nIt was discovered that the network packet classifier with\nnetfilter/firewall marks implementation in the Linux kernel did not\nproperly handle reference counting, leading to a use-after-free\nvulnerability. A local attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2023-3776)\n\nKevin Rich discovered that the netfilter subsystem in the Linux kernel did\nnot properly handle table rules flush in certain circumstances. A local\nattacker could possibly use this to cause a denial of service (system\ncrash) or execute arbitrary code. (CVE-2023-3777)\n\nKevin Rich discovered that the netfilter subsystem in the Linux kernel did\nnot properly handle rule additions to bound chains in certain\ncircumstances. A local attacker could possibly use this to cause a denial\nof service (system crash) or execute arbitrary code. (CVE-2023-3995)\n\nIt was discovered that the netfilter subsystem in the Linux kernel did not\nproperly handle PIPAPO element removal, leading to a use-after-free\nvulnerability. A local attacker could possibly use this to cause a denial\nof service (system crash) or execute arbitrary code. (CVE-2023-4004)\n\nKevin Rich discovered that the netfilter subsystem in the Linux kernel did\nnot properly handle bound chain deactivation in certain circumstances. A\nlocal attacker could possibly use this to cause a denial of service (system\ncrash) or execute arbitrary code. (CVE-2023-4015)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 22.04 LTS:\n linux-image-5.15.0-1045-azure 5.15.0-1045.52\n linux-image-5.15.0-1045-azure-fde 5.15.0-1045.52.1\n linux-image-azure-fde-lts-22.04 5.15.0.1045.52.23\n linux-image-azure-lts-22.04 5.15.0.1045.41\n\nUbuntu 20.04 LTS:\n linux-image-5.15.0-1045-azure 5.15.0-1045.52~20.04.1\n linux-image-azure 5.15.0.1045.52~20.04.34\n linux-image-azure-cvm 5.15.0.1045.52~20.04.34\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well. \n\nReferences:\n https://ubuntu.com/security/notices/USN-6332-1\n CVE-2022-40982, CVE-2022-4269, CVE-2022-48502, CVE-2023-0597,\n CVE-2023-1611, CVE-2023-1855, CVE-2023-1990, CVE-2023-2002,\n CVE-2023-20593, CVE-2023-2124, CVE-2023-21400, CVE-2023-2163,\n CVE-2023-2194, CVE-2023-2235, CVE-2023-2269, CVE-2023-23004,\n CVE-2023-28466, CVE-2023-30772, CVE-2023-3141, CVE-2023-32248,\n CVE-2023-3268, CVE-2023-33203, CVE-2023-33288, CVE-2023-35823,\n CVE-2023-35824, CVE-2023-35828, CVE-2023-35829, CVE-2023-3609,\n CVE-2023-3610, CVE-2023-3611, CVE-2023-3776, CVE-2023-3777,\n CVE-2023-3995, CVE-2023-4004, CVE-2023-4015\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/linux-azure/5.15.0-1045.52\n https://launchpad.net/ubuntu/+source/linux-azure-fde/5.15.0-1045.52.1\n https://launchpad.net/ubuntu/+source/linux-azure-5.15/5.15.0-1045.52~20.04.1\n\n. \n\nLivepatches for supported HWE kernels which are not based on an LTS\nkernel version will receive upgrades for a period of up to 9 months\nafter the build date of the kernel, or until the end of support for that\nkernel’s non-LTS distro release version, whichever is sooner", sources: [ { db: "NVD", id: "CVE-2023-21400", }, { db: "JVNDB", id: "JVNDB-2023-021902", }, { db: "CNVD", id: "CNVD-2023-65161", }, { db: "VULMON", id: "CVE-2023-21400", }, { db: "PACKETSTORM", id: "174246", }, { db: "PACKETSTORM", id: "174401", }, { db: "PACKETSTORM", id: "174453", }, { db: "PACKETSTORM", id: "174433", }, { db: "PACKETSTORM", id: "175072", }, { db: "PACKETSTORM", id: "174449", }, { db: "PACKETSTORM", id: "174534", }, ], trust: 2.88, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2023-21400", trust: 4.6, }, { db: "OPENWALL", id: "OSS-SECURITY/2023/07/14/2", trust: 2.5, }, { db: "OPENWALL", id: "OSS-SECURITY/2023/07/19/7", trust: 2.4, }, { db: "OPENWALL", id: "OSS-SECURITY/2023/07/19/2", trust: 2.4, }, { db: "PACKETSTORM", id: "175072", trust: 1.9, }, { db: "OPENWALL", id: "OSS-SECURITY/2023/07/25/7", trust: 1.8, }, { db: "JVNDB", id: "JVNDB-2023-021902", trust: 0.8, }, { db: "CNVD", id: "CNVD-2023-65161", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-202307-1159", trust: 0.6, }, { db: "VULMON", id: "CVE-2023-21400", trust: 0.1, }, { db: "PACKETSTORM", id: "174246", trust: 0.1, }, { db: "PACKETSTORM", id: "174401", trust: 0.1, }, { db: "PACKETSTORM", id: "174453", trust: 0.1, }, { db: "PACKETSTORM", id: "174433", trust: 0.1, }, { db: "PACKETSTORM", id: "174449", trust: 0.1, }, { db: "PACKETSTORM", id: "174534", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2023-65161", }, { db: "VULMON", id: "CVE-2023-21400", }, { db: "JVNDB", id: "JVNDB-2023-021902", }, { db: "PACKETSTORM", id: "174246", }, { db: "PACKETSTORM", id: "174401", }, { db: "PACKETSTORM", id: "174453", }, { db: "PACKETSTORM", id: "174433", }, { db: "PACKETSTORM", id: "175072", }, { db: "PACKETSTORM", id: "174449", }, { db: "PACKETSTORM", id: "174534", }, { db: "CNNVD", id: "CNNVD-202307-1159", }, { db: "NVD", id: "CVE-2023-21400", }, ], }, id: "VAR-202307-0874", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2023-65161", }, ], trust: 0.06, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "IoT", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2023-65161", }, ], }, last_update_date: "2024-08-14T12:37:17.595000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "Patch for Google Pixel Privilege Escalation Vulnerability", trust: 0.6, url: "https://www.cnvd.org.cn/patchInfo/show/442931", }, { title: "Google Pixel Security vulnerabilities", trust: 0.6, url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=246885", }, ], sources: [ { db: "CNVD", id: "CNVD-2023-65161", }, { db: "CNNVD", id: "CNNVD-202307-1159", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-667", trust: 1, }, { problemtype: "improper lock (CWE-667) [NVD evaluation ]", trust: 0.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2023-021902", }, { db: "NVD", id: "CVE-2023-21400", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.7, url: "https://nvd.nist.gov/vuln/detail/cve-2023-21400", }, { trust: 2.5, url: "https://source.android.com/security/bulletin/pixel/2023-07-01", }, { trust: 2.5, url: "http://www.openwall.com/lists/oss-security/2023/07/14/2", }, { trust: 2.4, url: "http://www.openwall.com/lists/oss-security/2023/07/19/2", }, { trust: 2.4, url: "http://www.openwall.com/lists/oss-security/2023/07/19/7", }, { trust: 1.8, url: "http://packetstormsecurity.com/files/175072/kernel-live-patch-security-notice-lsn-0098-1.html", }, { trust: 1.8, url: "http://www.openwall.com/lists/oss-security/2023/07/25/7", }, { trust: 1.8, url: "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", }, { trust: 1.8, url: "https://www.debian.org/security/2023/dsa-5480", }, { trust: 1, url: "https://security.netapp.com/advisory/ntap-20240119-0012/", }, { trust: 0.6, url: "https://cxsecurity.com/cveshow/cve-2023-21400/", }, { trust: 0.5, url: "https://nvd.nist.gov/vuln/detail/cve-2023-3995", }, { trust: 0.5, url: "https://nvd.nist.gov/vuln/detail/cve-2023-3777", }, { trust: 0.5, url: "https://nvd.nist.gov/vuln/detail/cve-2023-20593", }, { trust: 0.5, url: "https://nvd.nist.gov/vuln/detail/cve-2023-4004", }, { trust: 0.5, url: "https://nvd.nist.gov/vuln/detail/cve-2022-40982", }, { trust: 0.5, url: "https://nvd.nist.gov/vuln/detail/cve-2023-3609", }, { trust: 0.5, url: "https://nvd.nist.gov/vuln/detail/cve-2023-3776", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2023-4015", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2023-3610", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2023-3611", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-4269", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2023-3090", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2023-2124", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2023-2002", }, { trust: 0.1, url: "https://nvd.nist.gov", }, { trust: 0.1, url: "https://www.debian.org/security/", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2023-1206", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2023-21255", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2023-1380", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-39189", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2023-31084", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2023-2007", }, { trust: 0.1, url: "https://security-tracker.debian.org/tracker/linux", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2023-2269", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2023-2898", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2023-20588", }, { trust: 0.1, url: "https://www.debian.org/security/faq", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-oracle-5.15/5.15.0-1041.47~20.04.1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-gcp/5.15.0-1040.48", }, { trust: 0.1, url: "https://ubuntu.com/security/notices/usn-6315-1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-gke/5.15.0-1040.45", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-gkeop/5.15.0-1026.31", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-aws-5.15/5.15.0-1043.48~20.04.1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-aws/5.15.0-1043.48", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-nvidia/5.15.0-1031.31", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-oracle/5.15.0-1041.47", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-hwe-5.15/5.15.0-82.91~20.04.1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-lowlatency/5.15.0-82.91", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux/5.15.0-82.91", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-kvm/5.15.0-1040.45", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-ibm/5.15.0-1036.39", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-lowlatency-hwe-5.15/5.15.0-82.91~20.04.1", }, { trust: 0.1, url: "https://ubuntu.com/security/notices/usn-6332-1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-azure-5.15/5.15.0-1045.52~20.04.1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-azure-fde/5.15.0-1045.52.1", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2023-0597", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2023-2194", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-48502", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-azure/5.15.0-1045.52", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2023-1990", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2023-2235", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2023-1611", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2023-2163", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2023-1855", }, { trust: 0.1, url: "https://ubuntu.com/security/notices/usn-6325-1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-gkeop-5.15/5.15.0-1026.31~20.04.1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-intel-iotg/5.15.0-1038.43", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2023-40283", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2023-3567", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2023-4128", }, { trust: 0.1, url: "https://ubuntu.com/security/notices/usn-6330-1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-gcp-5.15/5.15.0-1040.48~20.04.1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-raspi/5.15.0-1036.39", }, { trust: 0.1, url: "https://ubuntu.com/security/notices/usn-6348-1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/linux-intel-iotg-5.15/5.15.0-1038.43~20.04.1", }, ], sources: [ { db: "CNVD", id: "CNVD-2023-65161", }, { db: "VULMON", id: "CVE-2023-21400", }, { db: "JVNDB", id: "JVNDB-2023-021902", }, { db: "PACKETSTORM", id: "174246", }, { db: "PACKETSTORM", id: "174401", }, { db: "PACKETSTORM", id: "174453", }, { db: "PACKETSTORM", id: "174433", }, { db: "PACKETSTORM", id: "175072", }, { db: "PACKETSTORM", id: "174449", }, { db: "PACKETSTORM", id: "174534", }, { db: "CNNVD", id: "CNNVD-202307-1159", }, { db: "NVD", id: "CVE-2023-21400", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2023-65161", }, { db: "VULMON", id: "CVE-2023-21400", }, { db: "JVNDB", id: "JVNDB-2023-021902", }, { db: "PACKETSTORM", id: "174246", }, { db: "PACKETSTORM", id: "174401", }, { db: "PACKETSTORM", id: "174453", }, { db: "PACKETSTORM", id: "174433", }, { db: "PACKETSTORM", id: "175072", }, { db: "PACKETSTORM", id: "174449", }, { db: "PACKETSTORM", id: "174534", }, { db: "CNNVD", id: "CNNVD-202307-1159", }, { db: "NVD", id: "CVE-2023-21400", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-07-27T00:00:00", db: "CNVD", id: "CNVD-2023-65161", }, { date: "2023-07-13T00:00:00", db: "VULMON", id: "CVE-2023-21400", }, { date: "2024-01-19T00:00:00", db: "JVNDB", id: "JVNDB-2023-021902", }, { date: "2023-08-21T16:25:52", db: "PACKETSTORM", id: "174246", }, { date: "2023-08-30T15:24:17", db: "PACKETSTORM", id: "174401", }, { date: "2023-09-02T13:17:45", db: "PACKETSTORM", id: "174453", }, { date: "2023-08-31T15:25:45", db: "PACKETSTORM", id: "174433", }, { date: "2023-10-11T16:48:43", db: "PACKETSTORM", id: "175072", }, { date: "2023-09-02T13:08:20", db: "PACKETSTORM", id: "174449", }, { date: "2023-09-06T17:15:58", db: "PACKETSTORM", id: "174534", }, { date: "2023-07-12T00:00:00", db: "CNNVD", id: "CNNVD-202307-1159", }, { date: "2023-07-13T00:15:24.340000", db: "NVD", id: "CVE-2023-21400", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2023-08-28T00:00:00", db: "CNVD", id: "CNVD-2023-65161", }, { date: "2023-07-14T00:00:00", db: "VULMON", id: "CVE-2023-21400", }, { date: "2024-01-19T08:13:00", db: "JVNDB", id: "JVNDB-2023-021902", }, { date: "2023-07-21T00:00:00", db: "CNNVD", id: "CNNVD-202307-1159", }, { date: "2024-01-19T16:15:08.817000", db: "NVD", id: "CVE-2023-21400", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "local", sources: [ { db: "PACKETSTORM", id: "174401", }, { db: "PACKETSTORM", id: "174453", }, { db: "PACKETSTORM", id: "174433", }, { db: "PACKETSTORM", id: "175072", }, { db: "PACKETSTORM", id: "174449", }, { db: "PACKETSTORM", id: "174534", }, { db: "CNNVD", id: "CNNVD-202307-1159", }, ], trust: 1.2, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Google of Android Vulnerability related to resource locking in products from multiple vendors such as", sources: [ { db: "JVNDB", id: "JVNDB-2023-021902", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "other", sources: [ { db: "CNNVD", id: "CNNVD-202307-1159", }, ], trust: 0.6, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.